Nothing Special   »   [go: up one dir, main page]

US20180316678A1 - System and Method for Secure Control of Resources of Wireless Mobile Communication Devices - Google Patents

System and Method for Secure Control of Resources of Wireless Mobile Communication Devices Download PDF

Info

Publication number
US20180316678A1
US20180316678A1 US16/025,583 US201816025583A US2018316678A1 US 20180316678 A1 US20180316678 A1 US 20180316678A1 US 201816025583 A US201816025583 A US 201816025583A US 2018316678 A1 US2018316678 A1 US 2018316678A1
Authority
US
United States
Prior art keywords
domain
mobile device
data
user
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/025,583
Other versions
US10298584B2 (en
Inventor
Russell Norman Owen
Herbert Anthony Little
David Paul Yach
Michael Shenfield
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
BlackBerry Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=31888326&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20180316678(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by BlackBerry Ltd filed Critical BlackBerry Ltd
Priority to US16/025,583 priority Critical patent/US10298584B2/en
Assigned to RESEARCH IN MOTION LIMITED reassignment RESEARCH IN MOTION LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YACH, DAVID P., SHENFIELD, MICHAEL, LITTLE, HERBERT A., OWEN, RUSSELL N.
Assigned to BLACKBERRY LIMITED reassignment BLACKBERRY LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: RESEARCH IN MOTION LIMITED
Publication of US20180316678A1 publication Critical patent/US20180316678A1/en
Priority to US16/415,702 priority patent/US10999282B2/en
Application granted granted Critical
Publication of US10298584B2 publication Critical patent/US10298584B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains

Definitions

  • This invention relates generally to wireless mobile communication devices, and in particular to providing security for such devices.
  • PCs personal computers
  • mainframe model where multiple users shared a single machine.
  • Resources on a mainframe computer were carefully shared between users by the operating system.
  • issues of control began to re-emerge.
  • corporate Information Technology (IT) departments increasingly saw the desktop PC as part of the corporate infrastructure. This caused tension between an original goal of the PC revolution, that the user controls their own computer, and the new role they played in the corporation. This conflict continues today and is played out on a regular basis in companies around the world.
  • IT Information Technology
  • the carrier owns and operates a wireless communication network in which the handheld computer is configured to operate, and therefore may want to exercise control over the traffic on that network. As well, the carrier may wish to add to their revenue by offering additional services to handheld computers. A carrier may thus be at odds with a corporate IT department in regard to handheld computer control, particularly where IT department controls may potentially increase network traffic or affect the carrier's ability to offer these services and thus reduce their revenue.
  • a system for secure control of a wireless mobile communication device comprises at least one domain, each domain including an asset of the wireless mobile communication device, and a domain controller configured to receive a request to perform an operation affecting at least one of the assets, to determine whether the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset, and to permit completion of the operation where the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset.
  • a method for secure control of a wireless mobile communication device comprises segregating assets of the wireless mobile communication device into a plurality of domains, each domain including at least one asset of the wireless mobile communication device, receiving a request to perform an operation affecting at least one of the assets, determining whether the operation is permitted by the domain that includes the affected asset, and allowing the operation to be completed where the operation is permitted by the domain that includes the affected asset.
  • FIG. 1 is a block diagram showing a communication system in which wireless mobile communication devices may be used.
  • FIG. 2 is a block diagram of an exemplary wireless mobile communication device in which a system and method for secure control may be implemented.
  • FIG. 3 is a block diagram illustrating multiple domains on a wireless mobile communication device.
  • FIG. 4 is a flow diagram showing a method for secure control of a wireless mobile communication device.
  • FIG. 5 is a block diagram of an example wireless mobile communication device.
  • FIG. 1 is a block diagram showing a communication system in which wireless mobile communication devices may be used.
  • the communication system 10 includes a Wide Area Network (WAN) 12 , coupled to a computer system 14 , a wireless network gateway 16 and a corporate Local Area Network (LAN) 18 .
  • the wireless network gateway 16 is also connected to a wireless communication network 20 in which a wireless mobile communication device 22 (“mobile device”), is configured to operate.
  • WAN Wide Area Network
  • LAN Local Area Network
  • the computer system 14 may be a desktop or laptop PC, which is configured to communicate to the WAN 12 , the Internet for example.
  • PCs such as computer system 14 , normally access the Internet through an Internet Service Provider (ISP), Application Service Provider (ASP) or the like.
  • ISP Internet Service Provider
  • ASP Application Service Provider
  • the corporate LAN 18 is an example of a typical working environment, in which multiple computers 28 are connected in a network. It is normally located behind a security firewall 24 .
  • a message server 26 operating on a computer behind the firewall 24 , acts as the primary interface for the corporation to exchange messages both within the LAN 18 , and with other external messaging clients via the WAN 12 .
  • Known message servers include, for example, MicrosoftTM Exchange Server and Lotus DominoTM. These servers are often used in conjunction with Internet mail routers to route and deliver mail.
  • the message server 26 may also provide additional functionality, such as dynamic database storage for data like calendars, todo lists, task lists, e-mail and documentation.
  • a message server 26 is shown in the LAN 18 , those skilled in the art will appreciate that a LAN may include other types of servers supporting resources that are shared between the networked computer systems 28 .
  • the message server 26 and electronic messaging are described for illustrative purposes only. Owner control systems and methods are applicable to a wide range of electronic devices, and are in no way limited to electronic devices with messaging capabilities.
  • the message server 26 provides messaging capabilities to networked computer systems 28 coupled to the LAN 18 .
  • a typical LAN 18 includes multiple computer systems 28 , each of which implements a messaging client, such as Microsoft OutlookTM, Lotus NotesTM, etc.
  • a messaging client such as Microsoft OutlookTM, Lotus NotesTM, etc.
  • messages are received by the message server 26 , distributed to the appropriate mailboxes for user accounts addressed in the received message, and are then accessed by a user through a messaging client operating on a computer system 28 .
  • the wireless gateway 16 provides an interface to a wireless network 20 , through which messages may be exchanged with a mobile device 22 .
  • the mobile device 22 may, for example, be a data communication device, a voice communication device, a dual-mode communication device such as many modern cellular telephones having both data and voice communications functionality, a multiple-mode device capable of voice, data and other types of communications, a personal digital assistant (PDA) enabled for wireless communications, or a laptop or desktop computer system with a wireless modem.
  • PDA personal digital assistant
  • the wireless gateway 16 may be configured to operate with more than one wireless network 20 , in which case the wireless gateway 16 may also determine a most likely network for locating a given mobile device 22 and possibly track mobile devices as users roam between countries or networks.
  • Any computer system with access to the WAN 12 may exchange messages with the mobile device 22 through the wireless network gateway 16 .
  • private wireless network gateways such as wireless Virtual Private Network (VPN) routers could also be implemented to provide a private interface to a wireless network.
  • VPN Virtual Private Network
  • a wireless VPN implemented in the LAN 18 may provide a private interface from the LAN 18 to one or more mobile devices such as 22 through the wireless network 20 .
  • Such a private interface to a mobile device 22 via the wireless network gateway 16 and/or the wireless network 20 may also effectively be extended to entities outside the LAN 18 by providing a message forwarding or redirection system that operates with the message server 26 .
  • a message redirection system is disclosed in U.S. Pat. No.
  • incoming messages received by the message server 26 and addressed to a user of a mobile device 22 are sent through the wireless network interface, either a wireless VPN router, wireless gateway 16 or other interface, for example, to the wireless network 20 and to the user's mobile device 22 .
  • Another alternate interface to a user's mailbox on a message server 26 may be a Wireless Application Protocol (WAP) gateway.
  • WAP gateway a list of messages in a user's mailbox on the message server 26 , and possibly each message or a portion of each message, may be sent to the mobile device 22 .
  • a wireless network 20 normally delivers messages to and from communication devices such as the mobile device 22 via RF transmissions between base stations and devices.
  • the wireless network 20 may, for example, be a data-centric wireless network, a voice-centric wireless network, or a dual-mode network that can support both voice and data communications over the same infrastructure.
  • Recently developed networks include Code Division Multiple Access (CDMA) networks, Groupe Special Mobile or the Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS) networks, and third-generation (3G) networks like Enhanced Data rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS), which are currently under development.
  • GPRS is a data overlay on top of the existing GSM wireless network, which is used operating in virtually every country in Europe.
  • data-centric networks include, but are not limited to, the MobitexTM Radio Network (“Mobitex”), and the DataTACTM Radio Network (“DataTAC”).
  • MobitexTM Radio Network (“Mobitex”)
  • DataTACTM Radio Network (“DataTAC”).
  • voice-centric data networks include Personal Communication Systems (PCS) networks like GSM and Time Division Multiple Access (TDMA) systems that have been available in North America and world-wide for several years.
  • PCS Personal Communication Systems
  • TDMA Time Division Multiple Access
  • a company which owns the corporate LAN 18 may provide a computer system 28 and a mobile device 22 to an employee.
  • Stakeholders in this example include the user of the mobile device 22 , the company which owns the corporate LAN 18 , and a carrier which operates the wireless network 20 .
  • each of these stakeholders may have an interest in controlling the mobile device 22 or certain resources or assets resident on the mobile device 22 .
  • FIG. 2 is a block diagram of an exemplary wireless mobile communication device in which a system and method for secure control may be implemented. It should be apparent to those skilled in the art that only the components involved in a secure control system are shown in FIG. 2 .
  • the mobile device 30 will typically include further components, depending upon the type and functionality of the mobile device 30 .
  • a mobile device 30 comprises a memory 32 , a domain controller 40 , a wireless transceiver 48 , a user interface (UI) 46 , and an interface or connector 50 .
  • the memory 32 includes a key store 31 , a software applications store 33 configured to store software applications, a message store 34 for storing electronic messages, a contacts store 35 for storing contact information, a domain policy store 36 , a persistent data store 37 , a communication “pipes” table 38 , and a properties store 39 .
  • These stores are illustrative of the types of information stores that may be provided in the memory 32 . Other information stores may also be provided instead of or in addition to those shown in FIG. 2 .
  • the memory 32 is a writeable store such as a RAM into which other device components may write data.
  • the key store 31 stores cryptographic keys which may be used by the domain controller to implement domain policies.
  • the software applications store 33 includes software applications that have been installed on the mobile device 30 , and may include, for example, an electronic messaging software application, a personal information management (PIM) software application, games, as well as other software applications.
  • the message store 34 stores electronic messages associated with one or more messaging software applications or services for which the mobile device 30 has been enabled.
  • the contacts store 35 also stores information normally associated with such messaging software applications and services, including contact names, telephone and fax numbers, email addresses, mailing addresses, and the like.
  • domain policies which specify the criteria used to determine into which domain a software application, property, or other information should be placed, are stored. Persistent data, or data which survives the termination of a software application which created it, is stored in the persistent store 37 .
  • Communication pipes are mobile device communication assets and are listed in the communication pipes table 38 .
  • the communication pipes table 38 may also include or reference an application programming interface (API) 41 through which data may be sent to and received from a communication pipe.
  • API application programming interface
  • Properties represent configuration data, and are stored in the properties store 39 .
  • Other data associated with the mobile device 30 or software applications installed on the mobile device 30 may be stored in the data stores shown in FIG. 2 , in further data stores in the memory 32 but not shown in FIG. 2 , or possibly in a separate memory component on the mobile device 30 .
  • the wireless transceiver 48 enables the mobile device 30 for communications via a wireless network, as described above in conjunction with FIG. 1 .
  • the mobile device 30 is also enabled for communications with a similarly-equipped PC or other device, including another mobile device, via the interface/connector 50 .
  • the domain controller 40 is coupled to the memory 32 , the wireless transceiver 48 , the UI 46 , and the interface/connector 50 .
  • access to such mobile device assets or resources is controlled by the domain controller 40 .
  • the domain controller 40 will likely be implemented most often as a software module or operating system that is executed by a mobile device processor (not shown).
  • the mobile device 30 is a JavaTM enabled device including a Java Virtual Machine (JVM) as its operating system
  • functionality of the domain controller 40 may be incorporated within the JVM or implemented as a software component that is executed by the JVM.
  • Domain control at the operating system level provides more streamlined and reliable domain security than domain control at a software application level.
  • the UI 46 may include such UI components as a keyboard or keypad, a display, or other components which may accept inputs from or provide outputs to a user of the mobile device 30 . Although shown as a single block in FIG. 2 , it should be apparent that a mobile device 30 typically includes more than one UI, and the UI 46 is therefore intended to represent one or more user interfaces.
  • the interface/connector 50 enables information transfer between the mobile device 30 and a PC or another device via a communication link established between the interface/connector 50 and a compatible interface or connector in the PC or other device.
  • the interface/connector 50 could be any of a plurality of data transfer components, including, for example, an optical data transfer interface such as an Infrared Data Association (IrDA) port, some other short-range wireless communications interface, or a wired interface such as serial or Universal Serial Bus (USB) port and connection.
  • Known short-range wireless communications interfaces include, for example, “Bluetooth” modules and 802.11 modules according to the Bluetooth or 802.11 specifications, respectively.
  • Bluetooth and 802.11 denote sets of specifications, available from the Institute of Electrical and Electronics Engineers (IEEE), relating to wireless LANs and wireless personal area networks, respectively. Since communications between the mobile device 30 and other systems or devices via the interface/connector 50 need not necessarily be via a physical connection, references to connecting a mobile device to a PC or other device or system includes establishing communications through either physical connections or wireless transfer schemes.
  • IEEE Institute of Electrical and Electronics Engineers
  • the mobile device 30 could be connected to a PC, for example, by placing the mobile device 30 in a mobile device cradle connected to a serial port on the PC, by positioning the mobile device 30 such that an optical port thereof is in a line of sight of a similar port of the PC, or by physically connecting or arranging the mobile device 30 and PC in some other manner so that data may be exchanged.
  • the particular operations involved in establishing communications between a mobile device and another system or device will be dependent upon the types of interfaces and/or connectors available in both the mobile device and the other system or device.
  • assets or resources include the wireless transceiver 48 , UI 46 , interface/connector 50 , processor 40 , and any of the stores or information in the memory 32 .
  • assets or resources include the wireless transceiver 48 , UI 46 , interface/connector 50 , processor 40 , and any of the stores or information in the memory 32 .
  • assets such as the UI 46
  • one or more of the stakeholders may wish to exerts tighter control over other assets, including the wireless transceiver 48 , interface/connector 50 , and information stored in the memory 32 , for example.
  • assets may be assigned to domains, as shown in the stores in the memory 32 .
  • the key store 31 includes cryptographic keys for domains B and C.
  • the software applications store 33 , domain policy store 36 , persistent data store 37 , and communication pipes table 38 respectively include software applications, domain policies, persistent data, and communication pipes associated with domains A, B and C.
  • the message store 34 and contacts store 35 include messages and contacts associated with domains B and C. In this example, only domains B and C have associated messaging software applications or services which use the message store 34 and contacts store 35 .
  • Domain C includes a communication pipe, but not for the purposes of electronic messaging in this example. It is also possible that not all domains on a mobile device include a communication pipe. This may occur, for example, when a domain includes only software applications which provide local mobile device functions which do not require communications to or from the mobile device.
  • a domain is a collection of objects that share a common level of trust, and can be owned and controlled by a mobile device stakeholder, such as a mobile device user, a mobile device owner, a carrier or a service provider. Placing an object in a domain means that the object is trusted, and that its use can be restricted to other domain members.
  • Each domain has a domain policy that controls which objects can become members of a domain, as described in further detail below. By creating domains and assigning one or more domains on the mobile device to each stakeholder, all stakeholders may maintain some level of control over mobile device assets that are part of the stakeholder's domain or domains.
  • the domain controller 40 manages each domain on the mobile device 30 and maintains control over access to domain assets or resources to ensure that trust requirements are satisfied before such access is granted.
  • most mobile devices may be purchased from any of a number of retailers. Once purchased, a mobile device user can preferably execute a pre-installed software application that allows the user to enter credit card and other billing information that is used to provision wireless network communication services.
  • a mobile device user can preferably execute a pre-installed software application that allows the user to enter credit card and other billing information that is used to provision wireless network communication services.
  • initial provisioning of such services on a new device may instead involve interactions with a carrier or service provider customer service representative via a telephone or Internet web page.
  • the billing information is sent to a wireless carrier billing server, which verifies the billing information and send a registration message to the mobile device.
  • the registration message is processed at the mobile device to establish carrier domain on the mobile device.
  • the carrier domain may include such assets as a browser that can be used to access Internet information and services via the carrier's wireless communication network. The user may then use the browser in the carrier domain to subscribe to a chat service, download the required software application from the Internet, and place the downloaded software application into the carrier domain.
  • Other domain services such as a domain backup frequency, for example, which specifies how often domain data should be backed up, may also be configured by the user for the carrier domain.
  • Domain backup generally involves the transfer of domain data, possibly including software applications, properties, and persistent data to an external system. Such a backup operation allows a device user, owner, or other stakeholder to restore a domain in the event that the domain becomes corrupted, for example.
  • the carrier maintains ultimate control over the carrier domain, as described in further detail below.
  • An electronic messaging service which supports message exchange between the mobile device and a personal email or other messaging account is one service that may be of interest to a mobile device user.
  • a PC software application component of such a service when installed on a PC configured to access the personal messaging account, establishes a user domain on the mobile device if one has not already been established. Any mobile device software applications required to use the service are then downloaded and installed on the mobile device, and placed in the user domain.
  • Such a service might also synchronize stored messages, contacts and possibly further data associated with the personal messaging account between the PC and the mobile device, creating messages, contacts, and data in the user domain.
  • the user domain Since the electronic messaging service, and thus the user domain, have access to a communication medium through which messages are exchanged with the PC, the user domain might also support Internet browsing. Using the web browser, the user may then download and install other software applications to the user domain. Where the software application is a birthday reminder program, for example, this program may access all of the contacts that lie in the user domain and create reminders for their birthdays.
  • the user domain may also have user-configurable settings, such as a domain backup frequency.
  • the user may send a message, an email for example, to the IT department of his or her employer.
  • the email includes the type of the mobile device and its network address.
  • the IT department then sends a create domain message to the mobile device.
  • the create domain message is received at the mobile device, the user may first be prompted, using a UI 46 ( FIG. 2 ), to accept this new domain.
  • the new employer domain is then created. Having created the employer domain on the device, the IT department uploads such information as the company directory and a Customer Relationship Management (CRM) software application to the device.
  • the employer domain may include settings which control behaviour and characteristics of the domain, such as domain backup frequency. It is contemplated, however, that at least the employer domain may be tightly controlled, such that employer domain configuration is established by the employer.
  • the introduction of domains in this example has some important mobile device control and security benefits.
  • the birthday reminder program in the user domain cannot access the company directory in the employer domain, even though they are both stored on the same mobile device.
  • synchronization of the user domain data, such as personal contacts, between the mobile device and a user's PC is accomplished through a user domain communication pipe, associated with the personal messaging service, so no corporate data from the employer domain is backed up to the user's PC when the user domain is backed up.
  • any synchronization or backup of the employer domain data is performed through the employer domain communication pipe, so that the user's personal contacts are not copied to the corporate server.
  • none of the software applications in the carrier domain or the user domain can access the communication pipe in the employer domain.
  • Only software applications in the employer domain can access corporate data which normally resides behind a security firewall in the employer's corporate network. This prevents “Trojan horse” type software applications from compromising the employer's network security.
  • the employer IT department prevents the user from installing software applications in the employer domain, as described in further detail below. The user can still install software applications in the user domain, but they are not trusted by the employer.
  • the carrier can disable or upgrade software applications in the carrier domain, but cannot effect software applications in the other domains.
  • the carrier may, of course, prevent traffic from the mobile device on their communication network, but any mobile device could be enabled for operation in multiple different communication networks operated by different carriers.
  • Super user software applications provided by the mobile device manufacturer, for example, or some other source trusted by all domains are members of multiple domains and thus present a unified view of data across multiple domains. This is useful in such software applications as an Address Book software application used to view and manage a contacts store on a mobile device.
  • Such super user software applications have access to multiple domains, but also preferably respect the security of each domain. For example, a synchronization software application might access all data but only backs up domain data through the appropriate domain pipe.
  • super user software applications may be outside the domains to which they have access, and effectively assume domain membership from time to time, as required. Super user software applications may therefore reside in a particular super user domain, or possibly in a part of a software applications store that is not associated with any particular domain.
  • the mobile device 30 ( FIG. 2 ) implies a segregation of the various stores in the memory 32 into different domain storage areas. However, it should be appreciated that implementation of domains on a mobile device may be much more flexible than would be apparent from FIG. 2 . For example, entries in any of the stores in the memory 32 need not be ordered by domain.
  • the software applications store 33 may include a first software application in domain A, followed by another software application in domain C, and then a third software application which is also in domain A. Even though the domain A software applications in this example do not occupy contiguous locations in the software applications store 33 , they are nonetheless associated with domain A.
  • FIG. 3 is a block diagram illustrating multiple domains on a wireless mobile communication device.
  • FIG. 2 shows domains from the perspective of physical device components, whereas FIG. 3 illustrates the practical effect of domains on mobile device assets. Therefore, the actual mobile device may be the same in FIGS. 2 and 3 , although domain-based secure control of a mobile device will become more apparent from FIG. 3 and the following description thereof.
  • the mobile device 52 in FIG. 3 includes an employer domain 54 , a carrier domain 62 , and a user domain 64 , each including software applications, a communication pipe, and properties.
  • the employer domain 54 and the user domain 64 also include contacts and messages.
  • the employer domain 54 and the user domain 64 are respectively secured using the employer key 56 and a user key 66 , as will be described in further detail below.
  • the carrier domain 62 , the employer domain 54 , and the user domain 64 are similar to the domains A, B and C, respectively, in FIG. 2 .
  • a default domain 58 which contains software applications and properties
  • a properties domain 68 which includes at least some of the properties stored in the properties store 39 ( FIG. 2 ), are also shown in FIG. 3 .
  • Placing a software application in a domain gives it access to domain assets, most notably the domain communication pipe(s) and domain data such as persistent data and properties.
  • domain assets most notably the domain communication pipe(s) and domain data such as persistent data and properties.
  • the CRM software application and the corporate messaging software application have access to the corporate communication pipe, data such as corporate contacts and messages associated with a corporate messaging account, and properties in the employer domain 54 .
  • Libraries within a domain are similarly accessible only from software applications in that domain.
  • both the employer domain 54 and the user domain 64 include a messaging software application.
  • the owners of both domains would have to trust such a software application. Since the user of the mobile device has control over the user domain 64 , a software application trusted by another domain could fairly easily be granted access to the user domain 64 by the user.
  • each domain owner has to trust a super user software application and grant access to such a software application to its respective domain.
  • Software application provisioning policy is preferably set on a per domain basis, so that the domain owner can control which software applications can be loaded into a domain. There are several methods of controlling/assigning a software application to a domain. These are discussed in further detail below.
  • a communication pipe is a means of communication between the mobile device and some external entity.
  • a particular physical transport layer such as Universal Serial Bus (USB), BluetoothTM, a serial port, 802.11 and GPRS, can represent several logical communication pipes depending on the gateway at the other end.
  • USB Universal Serial Bus
  • BluetoothTM BluetoothTM
  • serial port 802.11
  • GPRS GPRS radio
  • a GPRS radio can be used to communicate with both the carrier WAP gateway in the carrier domain 62 , as well as a corporate gateway through the corporate communication pipe in the employer domain 54 .
  • both the WAP gateway and the corporate communication pipe represent separate communication pipes even though they use the same physical transport.
  • One reason for this separation is that even though the same physical transport is used, the gateways are controlled by separate stakeholders.
  • Placing a communication pipe in a domain means that the domain owner trusts that communication pipe. This is usually due to their control of the gateway or of the encryption keys that are used for communications over the communication pipe.
  • the communication pipe often includes a gateway through a corporate security firewall, such that access to the communication pipe represents a possible avenue of attack against a corporate infrastructure.
  • a corporate entity such as an employer restricts access to the communication pipe and reduce the likelihood of attack.
  • any data that survives the termination of the software application that created it is said to be persistent.
  • persistent data is written to a disk or database.
  • Information in main memory is normally not persistent and disappears when the software application exits, gracefully or otherwise, unless the software application takes explicit action to preserve the data by writing it to a persistent store.
  • mobile devices Like most computers, mobile devices have persistent and non-persistent storage. Persistent data is often shared between software applications. Such sharing of data or software application integration leads to useful and convenient features but also introduces the possibility of data theft or corruption by unscrupulous software applications.
  • Domains allow the benefits of software application integration while mitigating the risk to important data.
  • all persistent data created by a software application is placed in the same domain as the software application. Only software applications in the same domain can access this persistent data. This allows the domain owner to ensure that only trusted software applications can access persistent data. Untrusted software applications can still be loaded onto a mobile device without compromising data integrity or security.
  • Properties are persistent data that represent configuration information that is either global, domain or software application specific. Unlike most persistent data, properties allow a finer grain of access control. For example, it is possible to define a property that can be read by a software application but not modified. Properties can be placed in a domain and used to store user configuration or to set policies.
  • configuration data handling schemes relate to configuration data that is global to the mobile device. Handling of configuration data on a per application basis is normally left up to the software application.
  • a system level domain-based mechanism for handling software application configuration data is desirable, for example, to place information about a software application in a secure location so that it can be used to define domain provisioning policy.
  • configuration data is removed from the control of the software application, the software application need not be trusted to set its own provisioning policy or manage its own application lifecycle.
  • properties provide a consistent set of software application configuration services to the software application developer.
  • These software application configuration services include automatic backup and restoring of properties, automatic generation of a user interface for editing properties, programmatic access to properties, a secure method of exchanging properties additions or changes over the air from a mobile device, and a secure and tamperproof offline properties storage mechanism.
  • properties may be used to control configuration of a mobile device, not just software applications on such a device.
  • Properties are named, typed data. They are akin to resources except that they are meant to be edited, whereas software application resources are usually defined when a software application is created and are not normally changed.
  • the name is an identifier that a software application can use to refer to a property, and the type indicates a type of data of the property. Properties may also have a description, separate from the name. Separating the description from the name allows a properties editing to be internationalized without recompiling a software application.
  • the following property identifies a server with which a software application interacts:
  • This property might be used by a CRM software application on a mobile device that accesses data on a corporate server.
  • the CRM software application is loaded in the employer domain 54 in FIG. 3 .
  • the server property, required by the CRM software application, is also placed or created in the employer domain 54 .
  • Properties preferably have access control. Not all properties can be read or modified by all software applications or stakeholders on a mobile device.
  • the CRM software application is able to read the name of the CRM server in the value field of the server property, but cannot modify it.
  • the ability to modify the server URL may be reserved for the employer or corporate IT department. This is particularly important when application properties are tied to system resources. For example, if a mobile device security firewall uses an application property to allow or deny access to a corporate gateway through the corporate communication pipe, then it would be important to prevent the software application from modifying this property. In this case, the software application cannot generate a user interface to allow editing this property, since it cannot modify the property. For this reason, it is important to have a trusted application generate the user interface for editing application properties.
  • This trusted software application or Property Editor ensures that properties are properly labelled, to prevent a user being misled into modifying a property, and that access control rules are enforced.
  • Each property may have access control rules for each software application, as well as for each of the stakeholders on a mobile device. Since properties may be included in every domain on a mobile device, a Property Editor is preferably implemented as a super user software application and thereby granted access to the properties in multiple domains.
  • the following property allows a software application to read but not modify or write to the property.
  • a user or a domain is able to both read and write to the property.
  • Global rights are normally associated with a mobile device owner, which is not necessarily the user, such as when the mobile device was provided to a user by an employer.
  • global rights include reading, but not writing to, the property.
  • Properties are preferably defined within a scope. Valid scopes, as shown in the properties store 39 in FIG. 2 , may include global, domain and application. When a software application requests a list of properties, it gets all readable global properties, all readable properties in the software application's domain, assuming the software application is a member of a domain, and all readable application properties for the software application. In general, any readable properties which may affect the software application are provided in such a list.
  • the properties placed within a domain may include application properties for the software applications within the domain, as well as domain properties.
  • Global properties are placed in a separate properties domain 68 , which is preferably accessible to all mobile device software applications, regardless of the domain in which each software application exists.
  • Access rules may also be applied to control the creation of new properties of any particular scope.
  • global scope indicates that global properties may be created by a user but not a software application:
  • Domain scope properties for a particular domain may be defined, for example, as:
  • New properties can be created in any of the software application's scopes, subject to scope access rules.
  • new properties created by a software application preferably have application scope.
  • a trusted software application As described above, a trusted software application, a Property Editor, generates a user interface for editing properties. Since software applications may be able to modify and create properties, there should be a way to programmatically invoke the Property Editor. For example, each software application may have a menu item called “Options” that can be selected to invoke the Property Editor. When invoked from within a software application, the property editor does not display properties that cannot be read by the software application. Properties that cannot be modified by the software application are displayed in a read only mode.
  • the Property Editor may group properties into multiple pages based on the scope of the properties, for example, to reduce clutter. It may be necessary to allow the software application to define property groups as a hint to the Property Editor in the case where there are too many properties to fit on a single page.
  • properties can preferably be backed up and restored through one or more communication pipes, such as through a serial port or over the air.
  • backup and restore operations may be performed using the wireless transceiver 48 or the interface/connector 50 .
  • Backup through an interface or connector such as a serial port may be initiated by a PC or other device with which a mobile device communicates. All application properties may be backed up by default, so that no serialization code is needed in the software applications. As well, any property data, and other domain data, that is stored to a disk may be digitally signed and encrypted before being sent to the mobile device. This prevents tampering with the property data as a way to circumvent the access control mechanisms.
  • Over the air backup and restore may be initiated either by a mobile device or by a remote server or system.
  • Mobile device-initiated backup and restore are important for transports that do not support sending data to a device without first requesting such data. For example, if the device can only access a remote network through a WAP gateway, the user initiates a backup of the device. This could be done by explicit user action or by setting up a timer. Over the air restoration allows restoring properties to the last saved state. Again, this could be explicitly initiated by the user as part of a device recovery task.
  • Server initiated backup and restore are forms of remote control of a mobile device. Where the path to the device allows server-initiated communication, the properties can be completely controlled from a remote server. Remote server actions may include, for example creating a property, modifying a property, deleting a property, getting a list of properties (globally or software application specific), and getting a list of software applications on a mobile device.
  • domains One purpose of domains is to define a restricted set of objects with a common trust relationship. In general, no access to domain software applications or data is granted to external entities, but all members of a domain are completely trusted. As described above, however, properties have a further level of access control. Although certain software applications may span several domains, such a software application may only access a domain if it is trusted and has been granted access to the domain by the owner of that domain.
  • the fundamental domain operations that are controlled are creating and deleting domains, managing software applications (installing and deleting), managing properties (creating, reading, modifying), and access to persistent data (creating, reading, modifying).
  • a finer grained control can be achieved by introducing additional domains, subdomains or domain libraries.
  • a subdomain is a domain that lies within another domain. Members of a subdomain inherit all of the privileges of the parent domain.
  • An example of a subdomain would be a human resources (HR) subdomain within the employer domain 54 . All software applications within the employer domain 54 , including those in the HR domain, can access the company directory on a corporate network through the corporate data pipe, but only software applications in the HR domain may be able to access personal information on the corporate network. This allows different levels of trust within a domain while sharing some common resources.
  • HR human resources
  • a code library is a member of a domain, then it may be used to grant restricted access to domain data to software applications outside the domain. This allows a domain owner to write their own access control rules and use them to grant limited access to domain data through the library.
  • domain libraries do not allow non-domain software applications to make calls to domain libraries, but the domain owner could relax this restriction on a per library basis.
  • a domain library that is accessible to software applications outside a domain is analogous to a domain controller in that it controls access to domain assets or resources associated with the library.
  • Such a domain library permits implementation of a finer granularity of domain access control or more complex access rules for a particular domain, or for specific assets or resources within a domain.
  • domain policies control how objects become members of a domain. There are several different possible domain policies, each of which relies on a different trusted entity.
  • Another relatively simple scheme is to trust the communication pipe. This means that anything received over a domain communication pipe is placed in that domain. This works well when the domain owner can control the pipe, as is the case with the carrier domain 62 , for example.
  • this type of domain policy is specified as shown in the domain policy store 36 .
  • the domain controller 40 determines that it belongs to domain A, the carrier domain 62 , and places the information in that domain.
  • the domain controller 40 accesses the domain policy store 36 to determine whether the domain for the communication pipe over which the information was received is configured for a trust the pipe domain policy.
  • the domain controller 40 may determine the domain for the communication pipe by consulting the communication pipe table 38 . Where the API 41 is provided for transferring data between the domain controller 40 and any communication pipe in the communication pipe table 38 , the communication pipe table may indicate to the domain controller 40 the domain to which the communication pipe belongs. It is also possible that received information may include an indicator of the domain in which it should be placed. The domain controller 40 then accesses the domain policy store 36 to determine the domain policy in effect for that domain.
  • each domain has an associated public and private key. Anything that is added to a domain must be digitally signed using the domain private key. Only digital signatures generated using the domain private key can be verified using the domain public key, such as the keys B and C, 56 and 66 . This allows domain information to arrive through any pipe.
  • a secure connection is preferably established between the mobile device 52 and the employer system before a create domain message is sent to the mobile device 52 .
  • a secure connection could be established through encryption of the create domain message or other cryptographic techniques, or using a secure communication protocol between the employer system and the mobile device 52 . Encryption may involve public key cryptographic operations, or “shared secret” type cryptography. Secure domain creation techniques may also be used by other stakeholders to securely create domains on the mobile device.
  • Digital signature schemes generally involve some sort of transformation of digitally signed information to provide for checking the integrity of the information and authentication of a source of the signed information.
  • a digest of information to be digitally signed is first generated using a non-reversible digest algorithm or transformation.
  • Known digest algorithms include Secure Hashing Algorithm 1 (SHA-1) and Message-Digest algorithm 5 (MD5). Other digest techniques that produce a unique digest for each unique input may also be used.
  • the digest is then further transformed using a signer's signature private key and a signature algorithm to generate a digital signature.
  • signature algorithms are normally reversible, but only when a signature public key corresponding to the signature private key is used. If the signed information has been changed after it was signed, or the digital signature was generated using any key other than the signer's signature private key, then signature verification using the signer's signature public key fails.
  • a domain owner digitally signs any information destined for a domain on the mobile device 52 using a signature private key.
  • the information is not placed in the domain unless the digital signature is verified using the domain owner's signature public key 56 or 66 for the domain.
  • the domain controller 40 determines the domain for which the information is destined. The domain controller 40 may determine the appropriate domain by accessing the communication pipes table 38 , or based on a domain indication either from the API 41 in the communication pipes table 38 or in the received information.
  • a domain indication in received information may be particularly useful in conjunction with this type of domain policy.
  • the domain controller 40 retrieves the corresponding key for the domain, key B in this example, from the key store 31 .
  • the information is placed in the domain where the digital signature is verified using the key B.
  • the received information may be discarded, or possibly placed in the default domain 58 if the digital signature is not verified.
  • the operations of the domain controller 40 are similar for other domains having a trust the key domain policy, such as the user domain 64 (domain C).
  • a public key is not stored on a mobile device, it is obtained from a public key repository if it is not available in the key store 31 when required. It should also be appreciated that other cryptographic access control mechanisms are possible, using cryptographic challenges and responses or shared secret keys, for example.
  • the software applications or data may be placed in a default domain 58 .
  • the default domain 58 includes software applications and properties and possibly allows access to unrestricted device assets or resources.
  • a default domain such as 58 may also provide temporary storage of unsigned or improperly signed software applications and data. Any software applications and data in the default domain 58 could then be placed into a user-controlled domain at a later time.
  • resources available to the default domain 58 are preferably limited.
  • domain policy when a domain is created, it may include an access list established by the domain owner that describes all allowable members. This works well with software applications, but becomes complex where control of persistent data is required. A hybrid scheme where data is verified by some other method might be appropriate here.
  • each new object could be placed in the domain by some on-device user interface, dependent upon a prompt to the user.
  • this domain policy when a software application or other domain data is received at a mobile device, the user either accepts the software application or data and places it in a domain or rejects the software application or data.
  • domain creation may be controlled cryptographically. However, once a domain is established, it may trust the domain pipe for further domain changes. Different domains might also use different security measures. Since the user domain 64 is controlled by the user of the mobile device 52 , the user may be prompted to accept or reject software applications and data for the user domain 64 , whereas the employer domain 54 and the, carrier domain 62 , as shown, use a cryptographic domain policy and a trust the pipe domain policy, respectively.
  • new domains could be created in response to requests from a stakeholder, possibly subject to acceptance by the user. Domain creation could be further restricted by trusting the mobile device manufacturer. The device manufacturer could set up domains when the mobile device is manufactured. When a particular component of a mobile device is configured to store information, then that component could be manufactured with certain domains. This technique applies to GPRS mobile devices, for example, which require a Subscriber Identity Module or SIM for operation. Domains could be configured on a SIM by a SIM manufacturer, owner or other stakeholder before the SIM is provided to a user.
  • FIG. 4 is a flow diagram showing a method for secure control of a wireless mobile communication device.
  • the method begins at step 70 , where a request to perform an operation is received at the mobile device.
  • the mobile device 30 ( FIG. 2 ), for example, may receive such a request through the wireless transceiver 48 , from a UI 46 , through the interface/connector 50 , or from a software application running on the mobile device 30 .
  • a received request is then passed to a domain controller 40 ( FIG. 2 ), which determines in which domain the assets or resources affected by the requested operation are located. Referring again to FIG.
  • the domain controller 40 determines that record 1 belongs to domain A.
  • a domain identifier or indicator is stored with each record in the persistent data store 37 .
  • Objects in other stores may similarly include such a domain identifier to allow the domain controller to determine the domain to which an object belongs.
  • digitally signed domain data which may include software applications, properties, persistent data, or other information, that is, received by the mobile device 30 may be stored in signed form. The domain controller 40 can then confirm that an object is trusted by a particular domain by verifying the digital signature stored with the object using the appropriate cryptographic key.
  • the domain controller 40 may also be configured to establish and maintain or at least consult an access control list that specifies associations between domains and the objects that have been granted access to the domains. Different domains on a mobile device may also use different schemes for indicating domain membership, provided the domain controller on the mobile device is configured to handle such different schemes.
  • the domain controller determines whether the requested operation is permitted. This determination involves determining the domain from which the received request originated. As described above, each member of a domain is trusted and has access to assets within that domain.
  • the requested operation is completed at step 76 where the operation is permitted. In the above example of a request from a software application to read record 1 , the read operation is completed where the requesting software application is in domain A, the same domain as the record to be read.
  • the domain controller 40 may determine, and possibly confirm, the domain from which a request originates substantially as described above in the context of determining the domain to which an asset belongs. Where the operation is not permitted, the operation is denied at step 78 , and error processing operations, if any, are performed at step 80 . Error processing operations at step 80 may include, for example, returning an error or failure indication to the requesting object and displaying an error message to a user of the mobile device.
  • the determination at step 74 may include further or alternative operations beyond determining whether the received request originated from the same domain as the domain assets affected by the requested operation.
  • a “same domain” determination represents but one example of how a trust relationship might be verified.
  • the software application might not belong to any particular domain. Therefore, instead of determining an originating domain, a domain controller determines whether the super user software application is trusted and has been granted access to the affected domain assets by the domain owner. Also, as described above, properties may have additional access rules. As such, when a requested operation affects properties, further criteria may be applied at step 74 to determine whether the operation is permitted.
  • Domain policies may also be examined by a domain controller at step 74 , where the received request relates to new domain data that is to be placed into an existing domain. If the request is a create domain message, then step 74 may involve interaction with a user to accept or reject a new domain.
  • the domain controller When data is to be sent using a particular domain's communication pipe, for example, the domain controller first determines whether an object or domain attempting to send the data has been granted access to the communication pipe by the domain owner, such as by determining whether the sending object or domain is in the same domain as the communication pipe. The domain controller 40 accesses the communication pipes table 38 to determine to which domain a communication pipe belongs, and then send data to the communication pipe via the API 41 where the sending object in that same domain or has been granted access to the communication pipe in that domain by the domain owner.
  • the method shown in FIG. 4 relates to control of a mobile device based on domains.
  • Global, domain, or application properties are used to establish further controls, as described above.
  • the processing of a request for an operation may therefore also or instead involve checking such properties to determine if an operation is permitted.
  • a software application might have access to a communication pipe in a domain
  • an application property might indicate that the software application has expired, or a global property may specify that the software application cannot send data from the mobile device.
  • properties are included in the domains shown in FIGS. 2 and 3 and affect operations associated with domains, property-based control may be implemented separately from domain-based control.
  • the application properties associated with software application may first be accessed to determine whether the operation is permitted for the software application. A request for the operation is then sent to a domain controller only if the application properties permit the operation by the software application.
  • application properties provide a first level of control
  • domains provide a further level of control. It should be appreciated, however, that either property-based control or domain-based control may be implemented on a mobile device. Although these control schemes complement each other, they can instead be independent.
  • a domain describes a set of data and possibly a communication pipe
  • the communication pipe is used to perform a backup operation on a domain. This involves sending all of the domain data, including properties and software applications, over the communication pipe to a backup system or server.
  • the backup system or server is used to re-establish the domain on the mobile device and restore all of the data.
  • the domain defines what should be backed up, as well as the trusted communication path to use. Domains that do not include a communication pipe may be backed up through another available data pipe or transport that has not been assigned to a domain. Digital signing and encryption techniques, when used during backup and restore operations, ensure security and integrity of domain data.
  • Super user software applications that span domains also assume domain membership for a finite period of time. This allows a super user software application to act on the behalf of a domain without having to duplicate code that enforces domain access control.
  • An example where this might be useful is in a data synchronization software application. When it is backing up a domain, such a software application assumes membership in that domain. This allows the underlying operating system to ensure that domain data is only written to the domain communication pipe.
  • domains One of the primary uses for domains is to provide data security. By placing a software application in a domain, access to that software application's data is restricted to other software applications in that domain. Levels of security within a single organization can be represented by multiple domains or by subdomains. Where the enforcement of domain policies is performed by a mobile device system such as a JVM and not a software application, bad programming on the part of the developer is less likely to result in a security breach.
  • Domains are also useful in over the air software application provisioning for mobile devices. Where each stakeholder is provided with a respective domain, software applications installed in one domain do not affect mobile device assets, software applications, or data in other domains. Thus, neither a carrier providing communication services to a mobile device nor an employer as an owner of a mobile device need be concerned that user software applications installed in a user domain on the mobile device will affect carrier domain assets, software applications or data or corporate assets, software applications or data.
  • Software application provisioning may also include loading of configuration data for a software application in the form of application properties. Other aspects of software applications on a mobile device are also controllable using application properties.
  • a domain owner such as a service provider, may specify that a software application may be executed only a specific number of times, only a specific number of times in a certain time period, or only a specific number of times before service charges apply.
  • a stakeholder maintains secure control over domain assets, including software applications in the domain.
  • properties can be mapped to mobile device resource access such as HTTP access and, phone access, for example, they can also be mapped to device state information, including information on available memory and date and time of last mobile device reset. This allows remote querying of the mobile device state. Such a query could be initiated by a device management server or be triggered by a timer on the mobile device. By querying these system-mapped properties, a server can remotely manage the mobile device. Some of these properties will be local to a domain, such as a maximum number of recipients per message, and some will be global to the device, the minimum length of a password, for example.
  • FIG. 5 is a block diagram of an example wireless mobile communication device.
  • the mobile device 500 is preferably a two-way communication device having at least voice and data communication capabilities.
  • the mobile device 500 preferably has the capability to communicate with other computer systems on the Internet.
  • the mobile device may be referred to as a data messaging device, a two-way pager, a cellular telephone with data messaging capabilities, a wireless Internet appliance, or a data communication device (with or without telephony capabilities).
  • a data messaging device a two-way pager
  • a cellular telephone with data messaging capabilities a wireless Internet appliance
  • a data communication device with or without telephony capabilities
  • the mobile device 500 includes a transceiver 511 , a microprocessor 538 , a display 522 , Flash memory 524 , RAM 526 , auxiliary input/output (I/O) devices 528 , a serial port 530 , a keyboard 532 , a speaker 534 , a microphone 536 , a short-range wireless communications sub-system 540 , and may also include other device sub-systems 542 .
  • the transceiver 511 preferably includes transmit and receive antennas 516 , 518 , a receiver (Rx) 512 , a transmitter (Tx) 514 , one or more local oscillators (LOs) 513 , and a digital signal processor (DSP) 520 .
  • the mobile device 500 preferably includes a plurality of software modules 524 A- 524 N that can be executed by the microprocessor 538 (and/or the DSP 520 ), including a voice communication module 524 A, a data communication module 524 B, and a plurality of other operational modules 524 N for carrying out a plurality of other functions.
  • the mobile device 500 is preferably a two-way communication device having voice and data communication capabilities.
  • the mobile device 500 may communicate over a voice network, such as any of the analog or digital cellular networks, and may also communicate over a data network.
  • the voice and data networks are depicted in FIG. 5 by the communication tower 519 . These voice and data networks may be separate communication networks using separate infrastructure, such as base stations, network controllers, etc., or they may be integrated into a single wireless network. References to the network 519 should therefore be interpreted as encompassing both a single voice and data network and separate networks.
  • the communication subsystem 511 is used to communicate with the network 519 .
  • the DSP 520 is used to send and receive communication signals to and from the transmitter 514 and receiver 512 , and may also exchange control information with the transmitter 514 and receiver 512 . If the voice and data communications occur at a single frequency, or closely-spaced set of frequencies, then a single LO 513 may be used in conjunction with the transmitter 514 and receiver 512 . Alternatively, if different frequencies are utilized for voice communications versus data communications, then a plurality of LOs 513 can be used to generate a plurality of frequencies corresponding to the network 519 . Although two antennas 516 , 518 are depicted in FIG. 5 , the mobile device 500 could be used with a single antenna structure. Information, which includes both voice and data information, is communicated to and from the communication module 511 via a link between the DSP 520 and the microprocessor 538 .
  • the detailed design of the communication subsystem 511 such as frequency band, component selection, power level, etc., will be dependent upon the communication network 519 in which the mobile device 500 is intended to operate.
  • a mobile device 500 intended to operate in a North American market may include a communication subsystem 511 designed to operate with the Mobitex or DataTAC mobile data communication networks and also designed to operate with any of a variety of voice communication networks, such as AMPS, TDMA, CDMA, PCS, etc., whereas a mobile device 500 intended for use in Europe may be configured to operate with the GPRS data communication network and the GSM voice communication network.
  • Other types of data and voice networks, both separate and integrated, may also be utilized with the mobile device 500 .
  • the access requirements for the mobile device 500 may also vary.
  • mobile devices are registered on the network using a unique identification number associated with each device.
  • network access is associated with a subscriber or user of the mobile device 500 .
  • a GPRS device typically requires a SIM in order to operate the mobile device 500 on a GPRS network.
  • Local or non-network communication functions may be operable, without the SIM, but the mobile device 500 will be unable to carry out any functions involving communications over the network 519 , other than any legally required operations, such as ‘911’ emergency calling.
  • domains may be established on a SIM before it is provided to a user, with further domains possibly being added to a SIM after it has been installed in a mobile device.
  • a GPRS device also includes a memory component
  • domains may exist on the memory component and the SIM. Different types of domain control and domain policies could be implemented depending upon the location of a domain.
  • the mobile device 500 may send and receive communication signals, preferably including both voice and data signals, over the network 519 .
  • Signals received by the antenna 516 from the communication network 519 are routed to the receiver 512 , which provides for signal amplification, frequency down conversion, filtering, channel selection, analog to digital conversion, etc. Analog to digital conversion of the received signal allows more complex communication functions, such as digital demodulation and decoding to be performed using the DSP 520 .
  • signals to be transmitted to the network 519 are processed, including modulation and encoding, for example, by the DSP 520 and are then provided to the transmitter 514 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 519 via the antenna 518 .
  • a single transceiver 511 is shown in FIG. 5 for both voice and data communications, it is possible that the mobile device 500 may include two distinct transceivers, such as a first transceiver for transmitting and receiving voice signals, and a second transceiver for transmitting and receiving data signals, or a first transceiver configured to operate within a first frequency band, and a second transceiver configured to operate within a second frequency band.
  • the DSP 520 may also provide for receiver and transmitter control.
  • the gain levels applied to communication signals in the receiver 512 and transmitter 514 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 520 .
  • Other transceiver control algorithms could also be implemented in the DSP 520 in order to provide more sophisticated control of the transceiver 511 .
  • the microprocessor 538 preferably manages and controls the overall operation of the mobile device 500 .
  • Many types of microprocessors or microcontrollers could be used here, or, alternatively, a single DSP 520 could be used to carry out the functions of the microprocessor 538 .
  • Low-level communication functions including at least data and voice communications, are performed through the DSP 520 in the transceiver 511 .
  • Other, high-level communication software applications, such as a voice communication software application 524 A, and a data communication software application 524 B may be stored in the Flash memory 524 for execution by the microprocessor 538 .
  • the voice communication module 524 A may provide a high-level user interface operable to transmit and receive voice calls between the mobile device 500 and a plurality of other voice devices via the network 519 .
  • the data communication module 524 B may provide a high-level user interface operable for sending and receiving data, such as e-mail messages, files, organizer information, short text messages, etc., between the mobile device 500 and a plurality of other data devices via the network 519 .
  • the microprocessor 538 also interacts with other device subsystems, such as the display 522 , Flash memory 524 , random access memory (RAM) 526 , auxiliary input/output (I/O) subsystems 528 , serial port 530 , keyboard 532 , speaker 534 , microphone 536 , a short-range communications subsystem 540 and any other device subsystems generally designated as 542 .
  • the modules 524 A-N are executed by the microprocessor 538 and may provide a high-level interface between a user of the mobile device and the mobile device.
  • This interface typically includes a graphical component provided through the display 522 , and an input/output component provided through the auxiliary I/O 528 , keyboard 532 , speaker 534 , or microphone 536 .
  • Such interfaces are designated generally as UI 46 in FIG. 2 .
  • Some of the subsystems shown in FIG. 5 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions.
  • some subsystems such as keyboard 532 and display 522 may be used for both communication-related functions, such as entering a text message for transmission over a data communication network, and device-resident functions such as a calculator or task list or other PDA type functions.
  • Flash memory 524 Operating system software used by the microprocessor 538 is preferably stored in a persistent store such as Flash memory 524 .
  • the Flash memory 524 may also include a file system for storing data.
  • the Flash memory 524 may also include data stores for application, domain and global properties.
  • the operating system, specific device software applications or modules, or parts thereof, may be temporarily loaded into a volatile store, such as RAM 526 for faster operation.
  • received communication signals may also be temporarily stored to RAM 526 , before permanently writing them to a file system located in the Flash memory 524 .
  • the device 500 includes a Flash memory 524 as a non-volatile store, it should be appreciated that Flash memory represents one example of a non-volatile memory.
  • Other memory arrangements such as battery backed-up RAM, for example, may be used instead of the Flash memory 524 .
  • An exemplary software application module 524 N that may be loaded onto the mobile device 500 is a PIM software application providing PDA functionality, such as calendar events, appointments, and task items.
  • This module 524 N may also interact with the voice communication module 524 A for managing phone calls, voice mails, etc., and may also interact with the data communication module 524 B for managing e-mail communications and other data transmissions.
  • all of the functionality of the voice communication module 524 A and the data communication module 524 B may be integrated into the PIM module.
  • the Flash memory 524 preferably provides a file system to facilitate storage of PIM data items on the device.
  • the PIM software application preferably includes the ability to send and receive data items, either by itself, or in conjunction with the voice and data communication modules 524 A, 524 B, via the wireless network 519 .
  • the PIM data items are preferably seamlessly integrated, synchronized and updated, via the wireless network 519 , with a corresponding set of data items stored or associated with a host computer system, thereby creating a mirrored system for data items associated with a particular user.
  • the mobile device 500 may also be manually synchronized with a host system by placing the mobile device 500 in an interface cradle, which couples the serial port 530 of the mobile device 500 to the serial port of the host system.
  • the serial port 530 may also be used to download other software application modules 524 N, properties, and data to one or more domains on the mobile device 500 .
  • This wired download path may further be used to load an encryption key onto the mobile device 500 for use in secure communications, which is a more secure method than exchanging encryption information via the wireless network 519 .
  • Additional software application modules 524 N, properties and data may also be loaded to domains on the mobile device 500 through the network 519 , through an auxiliary I/O subsystem 528 , through the short-range communications subsystem 540 , or through any other suitable subsystem 542 , and installed by a user in the Flash memory 524 or RAM 526 .
  • Such flexibility in software application installation increases the functionality of the mobile device 500 and may provide enhanced on-device functions, communication-related functions, or both.
  • secure communication software applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 500 .
  • a received signal such as a text message or a web page download
  • the transceiver 511 When the mobile device 500 is operating in a data communication mode, a received signal, such as a text message or a web page download, will be processed by the transceiver 511 and provided to the microprocessor 538 , which will preferably further process the received signal for output to the display 522 , or, alternatively, to an auxiliary I/O device 528 .
  • a user of mobile device 500 may also compose data items, such as email messages, using the keyboard 532 , which is preferably a complete alphanumeric keyboard laid out in the QWERTY style, although other styles of complete alphanumeric keyboards such as the known DVORAK style may also be used.
  • auxiliary I/O devices 528 may include a thumbwheel input device, a touchpad, a variety of switches, a rocker input switch, etc.
  • the composed data items input by the user may then be transmitted over the communication network 519 via the transceiver 511 .
  • the data communication module 524 B is in a particular domain, received and composed data items would preferably be stored in that domain, and the composed data items would also be sent over the domain data pipe.
  • the overall operation of the mobile device 500 is substantially similar to the data mode, except that received signals are preferably output to the speaker 534 , voice signals for transmission are generated by a microphone 536 , and a different domain data pipe and assets may be used.
  • Alternative voice or audio I/O subsystems such as a voice message recording subsystem, may also be implemented on the mobile device 500 .
  • voice or audio signal output is preferably accomplished primarily through the speaker 534
  • the display 522 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information.
  • the microprocessor 538 in conjunction with the voice communication module 524 A and the operating system software, may detect the caller identification information of an incoming voice call and display it on the display 522 .
  • a short-range communications subsystem 540 may also be included in the mobile device 500 .
  • the subsystem 540 may include an infrared device and associated circuits and components, or a Bluetooth or 802.11 short-range wireless communication module to provide for communication with similarly-enabled systems and devices.
  • owner information insertion, owner control information insertion, and software application loading operations as described above may be enabled on the mobile device 500 via the serial port 530 or other short-range communications subsystem 540 .
  • the invention provides improved security for wireless mobile communication devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 15/207,125 filed on Jul. 11, 2016 by Russell N. Owen, et al. entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices” (Attorney Docket No. 10742-US-CNT[4]—4214-24822), which is a continuation of U.S. Pat. No. 9,391,992 issued on Jul. 12, 2016 entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices” (Attorney Docket No. 10742-US-CNT[3]— 4214-24821), which is a continuation of U.S. Pat. No. 8,893,266 issued on Nov. 18, 2014 entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices,” (Attorney Docket No. 10742-US-CNT[2]—4214-24820), which is a continuation of U.S. Pat. No. 8,661,531, issued on Feb. 25, 2014 entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices,” (Attorney Docket No. 10742-US-CNT—4214-24809), which is a continuation of U.S. Pat. No. 8,544,084, issued on Sep. 24, 2013 entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices,” (Attorney Docket No. 10742-US-PCT—4214-24802), which is a National Stage Filing of International Application No. PCT/CA2003/001245 filed Aug. 19, 2003, by Russell N. Owen, et al. entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices,” which claims priority to U.S. Provisional Application No. 60/404,120 filed on Aug. 19, 2002, by Russell N. Owen, et al. entitled, “System and Method for Secure Control of Resources of Wireless Mobile Communication Devices,” (Attorney Docket No. 10742-US-PRV—4214-24800), all of which are incorporated by reference herein as if reproduced in their entirety.
  • TECHNICAL FIELD
  • This invention relates generally to wireless mobile communication devices, and in particular to providing security for such devices.
  • BACKGROUND ART
  • When personal computers (PCs) were first introduced, one of their greatest appeals was that the machine was controlled by its user. This was in stark contrast to the mainframe model, where multiple users shared a single machine. Resources on a mainframe computer were carefully shared between users by the operating system. On a PC having a single user at any time, this type of partitioning of resources was not necessary. As the PC began to displace the corporate mainframe computer, however, issues of control began to re-emerge. Corporate Information Technology (IT) departments, increasingly saw the desktop PC as part of the corporate infrastructure. This caused tension between an original goal of the PC revolution, that the user controls their own computer, and the new role they played in the corporation. This conflict continues today and is played out on a regular basis in companies around the world.
  • A similar tension exists with handheld and other portable computers. Such as wireless mobile communication devices. However, the situation with handheld computers is more complex for several reasons. Since handheld computers are becoming relatively inexpensive, many users purchase such devices for personal use. Such user-purchased devices cannot be said to be owned by a corporation of which the user is an employee, but they often come to contain corporate data such as contacts, calendar entries and email. Even when a handheld computer is purchased by a corporate employer and provided to an employee, the handheld computer is likely to be used outside the corporate premises. This may require external access to the corporate infrastructure. Allowing an unsecured device to access the corporate network offers potential for security breaches. Furthermore, when a handheld computer is enabled for wireless communications, a carrier becomes another interested party with respect to the handheld computer. The carrier owns and operates a wireless communication network in which the handheld computer is configured to operate, and therefore may want to exercise control over the traffic on that network. As well, the carrier may wish to add to their revenue by offering additional services to handheld computers. A carrier may thus be at odds with a corporate IT department in regard to handheld computer control, particularly where IT department controls may potentially increase network traffic or affect the carrier's ability to offer these services and thus reduce their revenue.
  • Therefore, there remains a need for a system and method for secure control of a wireless communication device, which allows each individual stakeholders, including the user, corporate owner or corporate system operator, carrier, and possibly other stakeholders, to control their device assets without affecting the other stakeholders.
  • DISCLOSURE OF INVENTION
  • According to an aspect of the invention, a system for secure control of a wireless mobile communication device comprises at least one domain, each domain including an asset of the wireless mobile communication device, and a domain controller configured to receive a request to perform an operation affecting at least one of the assets, to determine whether the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset, and to permit completion of the operation where the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset.
  • In accordance with another aspect of the invention, a method for secure control of a wireless mobile communication device, comprises segregating assets of the wireless mobile communication device into a plurality of domains, each domain including at least one asset of the wireless mobile communication device, receiving a request to perform an operation affecting at least one of the assets, determining whether the operation is permitted by the domain that includes the affected asset, and allowing the operation to be completed where the operation is permitted by the domain that includes the affected asset.
  • Further features of secure control systems and methods will be described or will become apparent in the course of the following detailed description.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram showing a communication system in which wireless mobile communication devices may be used.
  • FIG. 2 is a block diagram of an exemplary wireless mobile communication device in which a system and method for secure control may be implemented.
  • FIG. 3 is a block diagram illustrating multiple domains on a wireless mobile communication device.
  • FIG. 4 is a flow diagram showing a method for secure control of a wireless mobile communication device.
  • FIG. 5 is a block diagram of an example wireless mobile communication device.
  • BEST MODE FOR CARRYING OUT THE INVENTION
  • FIG. 1 is a block diagram showing a communication system in which wireless mobile communication devices may be used. The communication system 10 includes a Wide Area Network (WAN) 12, coupled to a computer system 14, a wireless network gateway 16 and a corporate Local Area Network (LAN) 18. The wireless network gateway 16 is also connected to a wireless communication network 20 in which a wireless mobile communication device 22 (“mobile device”), is configured to operate.
  • The computer system 14 may be a desktop or laptop PC, which is configured to communicate to the WAN 12, the Internet for example. PCs, such as computer system 14, normally access the Internet through an Internet Service Provider (ISP), Application Service Provider (ASP) or the like.
  • The corporate LAN 18 is an example of a typical working environment, in which multiple computers 28 are connected in a network. It is normally located behind a security firewall 24. Within the corporate LAN 30, a message server 26, operating on a computer behind the firewall 24, acts as the primary interface for the corporation to exchange messages both within the LAN 18, and with other external messaging clients via the WAN 12. Known message servers include, for example, Microsoft™ Exchange Server and Lotus Domino™. These servers are often used in conjunction with Internet mail routers to route and deliver mail. The message server 26 may also provide additional functionality, such as dynamic database storage for data like calendars, todo lists, task lists, e-mail and documentation. Although only a message server 26 is shown in the LAN 18, those skilled in the art will appreciate that a LAN may include other types of servers supporting resources that are shared between the networked computer systems 28. The message server 26 and electronic messaging are described for illustrative purposes only. Owner control systems and methods are applicable to a wide range of electronic devices, and are in no way limited to electronic devices with messaging capabilities.
  • The message server 26 provides messaging capabilities to networked computer systems 28 coupled to the LAN 18. A typical LAN 18 includes multiple computer systems 28, each of which implements a messaging client, such as Microsoft Outlook™, Lotus Notes™, etc. Within the LAN 18, messages are received by the message server 26, distributed to the appropriate mailboxes for user accounts addressed in the received message, and are then accessed by a user through a messaging client operating on a computer system 28.
  • The wireless gateway 16 provides an interface to a wireless network 20, through which messages may be exchanged with a mobile device 22. The mobile device 22 may, for example, be a data communication device, a voice communication device, a dual-mode communication device such as many modern cellular telephones having both data and voice communications functionality, a multiple-mode device capable of voice, data and other types of communications, a personal digital assistant (PDA) enabled for wireless communications, or a laptop or desktop computer system with a wireless modem. An exemplary mobile device is described in further detail below.
  • Such functions as addressing of the mobile device 22, encoding or otherwise transforming messages for wireless transmission, and any other interface functions may be performed by the wireless gateway 16. The wireless gateway 16 may be configured to operate with more than one wireless network 20, in which case the wireless gateway 16 may also determine a most likely network for locating a given mobile device 22 and possibly track mobile devices as users roam between countries or networks.
  • Any computer system with access to the WAN 12 may exchange messages with the mobile device 22 through the wireless network gateway 16. Alternatively, private wireless network gateways such as wireless Virtual Private Network (VPN) routers could also be implemented to provide a private interface to a wireless network. For example, a wireless VPN implemented in the LAN 18 may provide a private interface from the LAN 18 to one or more mobile devices such as 22 through the wireless network 20. Such a private interface to a mobile device 22 via the wireless network gateway 16 and/or the wireless network 20 may also effectively be extended to entities outside the LAN 18 by providing a message forwarding or redirection system that operates with the message server 26. Such a message redirection system is disclosed in U.S. Pat. No. 6,219,694, which is hereby incorporated into this application by reference. In this type of system, incoming messages received by the message server 26 and addressed to a user of a mobile device 22 are sent through the wireless network interface, either a wireless VPN router, wireless gateway 16 or other interface, for example, to the wireless network 20 and to the user's mobile device 22. Another alternate interface to a user's mailbox on a message server 26 may be a Wireless Application Protocol (WAP) gateway. Through a WAP gateway, a list of messages in a user's mailbox on the message server 26, and possibly each message or a portion of each message, may be sent to the mobile device 22.
  • A wireless network 20 normally delivers messages to and from communication devices such as the mobile device 22 via RF transmissions between base stations and devices. The wireless network 20 may, for example, be a data-centric wireless network, a voice-centric wireless network, or a dual-mode network that can support both voice and data communications over the same infrastructure. Recently developed networks include Code Division Multiple Access (CDMA) networks, Groupe Special Mobile or the Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS) networks, and third-generation (3G) networks like Enhanced Data rates for Global Evolution (EDGE) and Universal Mobile Telecommunications Systems (UMTS), which are currently under development. GPRS is a data overlay on top of the existing GSM wireless network, which is used operating in virtually every country in Europe. Some older examples of data-centric networks include, but are not limited to, the Mobitex™ Radio Network (“Mobitex”), and the DataTAC™ Radio Network (“DataTAC”). Examples of known voice-centric data networks include Personal Communication Systems (PCS) networks like GSM and Time Division Multiple Access (TDMA) systems that have been available in North America and world-wide for several years.
  • In the system 10, a company which owns the corporate LAN 18 may provide a computer system 28 and a mobile device 22 to an employee. Stakeholders in this example include the user of the mobile device 22, the company which owns the corporate LAN 18, and a carrier which operates the wireless network 20. As described above, each of these stakeholders may have an interest in controlling the mobile device 22 or certain resources or assets resident on the mobile device 22.
  • FIG. 2 is a block diagram of an exemplary wireless mobile communication device in which a system and method for secure control may be implemented. It should be apparent to those skilled in the art that only the components involved in a secure control system are shown in FIG. 2. The mobile device 30 will typically include further components, depending upon the type and functionality of the mobile device 30.
  • As shown in FIG. 2, a mobile device 30 comprises a memory 32, a domain controller 40, a wireless transceiver 48, a user interface (UI) 46, and an interface or connector 50. The memory 32 includes a key store 31, a software applications store 33 configured to store software applications, a message store 34 for storing electronic messages, a contacts store 35 for storing contact information, a domain policy store 36, a persistent data store 37, a communication “pipes” table 38, and a properties store 39. These stores are illustrative of the types of information stores that may be provided in the memory 32. Other information stores may also be provided instead of or in addition to those shown in FIG. 2.
  • The memory 32 is a writeable store such as a RAM into which other device components may write data. Within the memory 32, the key store 31 stores cryptographic keys which may be used by the domain controller to implement domain policies. The software applications store 33 includes software applications that have been installed on the mobile device 30, and may include, for example, an electronic messaging software application, a personal information management (PIM) software application, games, as well as other software applications. The message store 34 stores electronic messages associated with one or more messaging software applications or services for which the mobile device 30 has been enabled. The contacts store 35 also stores information normally associated with such messaging software applications and services, including contact names, telephone and fax numbers, email addresses, mailing addresses, and the like. In the domain policy store 36, domain membership control policies (“domain policies”), which specify the criteria used to determine into which domain a software application, property, or other information should be placed, are stored. Persistent data, or data which survives the termination of a software application which created it, is stored in the persistent store 37. Communication pipes, described in further detail below, are mobile device communication assets and are listed in the communication pipes table 38. As will also be described below, the communication pipes table 38 may also include or reference an application programming interface (API) 41 through which data may be sent to and received from a communication pipe. Properties represent configuration data, and are stored in the properties store 39. Other data associated with the mobile device 30 or software applications installed on the mobile device 30 may be stored in the data stores shown in FIG. 2, in further data stores in the memory 32 but not shown in FIG. 2, or possibly in a separate memory component on the mobile device 30.
  • The wireless transceiver 48 enables the mobile device 30 for communications via a wireless network, as described above in conjunction with FIG. 1. The mobile device 30 is also enabled for communications with a similarly-equipped PC or other device, including another mobile device, via the interface/connector 50. In FIG. 2, the domain controller 40 is coupled to the memory 32, the wireless transceiver 48, the UI 46, and the interface/connector 50. As will be described in further detail below, access to such mobile device assets or resources is controlled by the domain controller 40. The domain controller 40 will likely be implemented most often as a software module or operating system that is executed by a mobile device processor (not shown). For example, where the mobile device 30 is a Java™ enabled device including a Java Virtual Machine (JVM) as its operating system, functionality of the domain controller 40 may be incorporated within the JVM or implemented as a software component that is executed by the JVM. Domain control at the operating system level provides more streamlined and reliable domain security than domain control at a software application level.
  • The UI 46 may include such UI components as a keyboard or keypad, a display, or other components which may accept inputs from or provide outputs to a user of the mobile device 30. Although shown as a single block in FIG. 2, it should be apparent that a mobile device 30 typically includes more than one UI, and the UI 46 is therefore intended to represent one or more user interfaces.
  • The interface/connector 50 enables information transfer between the mobile device 30 and a PC or another device via a communication link established between the interface/connector 50 and a compatible interface or connector in the PC or other device. The interface/connector 50 could be any of a plurality of data transfer components, including, for example, an optical data transfer interface such as an Infrared Data Association (IrDA) port, some other short-range wireless communications interface, or a wired interface such as serial or Universal Serial Bus (USB) port and connection. Known short-range wireless communications interfaces include, for example, “Bluetooth” modules and 802.11 modules according to the Bluetooth or 802.11 specifications, respectively. It will be apparent to those skilled in the art that Bluetooth and 802.11 denote sets of specifications, available from the Institute of Electrical and Electronics Engineers (IEEE), relating to wireless LANs and wireless personal area networks, respectively. Since communications between the mobile device 30 and other systems or devices via the interface/connector 50 need not necessarily be via a physical connection, references to connecting a mobile device to a PC or other device or system includes establishing communications through either physical connections or wireless transfer schemes. Thus, the mobile device 30 could be connected to a PC, for example, by placing the mobile device 30 in a mobile device cradle connected to a serial port on the PC, by positioning the mobile device 30 such that an optical port thereof is in a line of sight of a similar port of the PC, or by physically connecting or arranging the mobile device 30 and PC in some other manner so that data may be exchanged. The particular operations involved in establishing communications between a mobile device and another system or device will be dependent upon the types of interfaces and/or connectors available in both the mobile device and the other system or device.
  • As described above, multiple stakeholders may have interests in controlling mobile device assets or resources. In the mobile device 30, assets or resources include the wireless transceiver 48, UI 46, interface/connector 50, processor 40, and any of the stores or information in the memory 32. Some of these assets, such as the UI 46, might be usable by any software application or system on the mobile device 30, whereas one or more of the stakeholders may wish to exerts tighter control over other assets, including the wireless transceiver 48, interface/connector 50, and information stored in the memory 32, for example.
  • In order to provide multiple-stakeholder secure control of the mobile device 30, assets may be assigned to domains, as shown in the stores in the memory 32. The key store 31 includes cryptographic keys for domains B and C. The software applications store 33, domain policy store 36, persistent data store 37, and communication pipes table 38 respectively include software applications, domain policies, persistent data, and communication pipes associated with domains A, B and C. The message store 34 and contacts store 35 include messages and contacts associated with domains B and C. In this example, only domains B and C have associated messaging software applications or services which use the message store 34 and contacts store 35. Domain C includes a communication pipe, but not for the purposes of electronic messaging in this example. It is also possible that not all domains on a mobile device include a communication pipe. This may occur, for example, when a domain includes only software applications which provide local mobile device functions which do not require communications to or from the mobile device.
  • A domain is a collection of objects that share a common level of trust, and can be owned and controlled by a mobile device stakeholder, such as a mobile device user, a mobile device owner, a carrier or a service provider. Placing an object in a domain means that the object is trusted, and that its use can be restricted to other domain members. Each domain has a domain policy that controls which objects can become members of a domain, as described in further detail below. By creating domains and assigning one or more domains on the mobile device to each stakeholder, all stakeholders may maintain some level of control over mobile device assets that are part of the stakeholder's domain or domains. The domain controller 40 manages each domain on the mobile device 30 and maintains control over access to domain assets or resources to ensure that trust requirements are satisfied before such access is granted.
  • For example, most mobile devices may be purchased from any of a number of retailers. Once purchased, a mobile device user can preferably execute a pre-installed software application that allows the user to enter credit card and other billing information that is used to provision wireless network communication services. Those skilled in the art will appreciate that initial provisioning of such services on a new device may instead involve interactions with a carrier or service provider customer service representative via a telephone or Internet web page. The billing information is sent to a wireless carrier billing server, which verifies the billing information and send a registration message to the mobile device. The registration message is processed at the mobile device to establish carrier domain on the mobile device.
  • The carrier domain may include such assets as a browser that can be used to access Internet information and services via the carrier's wireless communication network. The user may then use the browser in the carrier domain to subscribe to a chat service, download the required software application from the Internet, and place the downloaded software application into the carrier domain. Other domain services, such as a domain backup frequency, for example, which specifies how often domain data should be backed up, may also be configured by the user for the carrier domain. Domain backup generally involves the transfer of domain data, possibly including software applications, properties, and persistent data to an external system. Such a backup operation allows a device user, owner, or other stakeholder to restore a domain in the event that the domain becomes corrupted, for example. Although the user may configure some settings for the carrier domain on the mobile device, the carrier maintains ultimate control over the carrier domain, as described in further detail below.
  • The user may also install other software applications and provision further services using the mobile device. An electronic messaging service which supports message exchange between the mobile device and a personal email or other messaging account is one service that may be of interest to a mobile device user. A PC software application component of such a service, when installed on a PC configured to access the personal messaging account, establishes a user domain on the mobile device if one has not already been established. Any mobile device software applications required to use the service are then downloaded and installed on the mobile device, and placed in the user domain. Such a service might also synchronize stored messages, contacts and possibly further data associated with the personal messaging account between the PC and the mobile device, creating messages, contacts, and data in the user domain. Since the electronic messaging service, and thus the user domain, have access to a communication medium through which messages are exchanged with the PC, the user domain might also support Internet browsing. Using the web browser, the user may then download and install other software applications to the user domain. Where the software application is a birthday reminder program, for example, this program may access all of the contacts that lie in the user domain and create reminders for their birthdays. The user domain may also have user-configurable settings, such as a domain backup frequency.
  • Where the user wishes to use the mobile device for work purposes as well, he or she may send a message, an email for example, to the IT department of his or her employer. The email includes the type of the mobile device and its network address. The IT department then sends a create domain message to the mobile device. When the create domain message is received at the mobile device, the user may first be prompted, using a UI 46 (FIG. 2), to accept this new domain. The new employer domain is then created. Having created the employer domain on the device, the IT department uploads such information as the company directory and a Customer Relationship Management (CRM) software application to the device. As described above for the carrier and personal domains, the employer domain may include settings which control behaviour and characteristics of the domain, such as domain backup frequency. It is contemplated, however, that at least the employer domain may be tightly controlled, such that employer domain configuration is established by the employer.
  • The introduction of domains in this example has some important mobile device control and security benefits. For example, the birthday reminder program in the user domain cannot access the company directory in the employer domain, even though they are both stored on the same mobile device. Also, synchronization of the user domain data, such as personal contacts, between the mobile device and a user's PC is accomplished through a user domain communication pipe, associated with the personal messaging service, so no corporate data from the employer domain is backed up to the user's PC when the user domain is backed up. Similarly, any synchronization or backup of the employer domain data is performed through the employer domain communication pipe, so that the user's personal contacts are not copied to the corporate server.
  • In addition, none of the software applications in the carrier domain or the user domain can access the communication pipe in the employer domain. Only software applications in the employer domain can access corporate data which normally resides behind a security firewall in the employer's corporate network. This prevents “Trojan horse” type software applications from compromising the employer's network security. The employer IT department prevents the user from installing software applications in the employer domain, as described in further detail below. The user can still install software applications in the user domain, but they are not trusted by the employer.
  • The carrier can disable or upgrade software applications in the carrier domain, but cannot effect software applications in the other domains. The carrier may, of course, prevent traffic from the mobile device on their communication network, but any mobile device could be enabled for operation in multiple different communication networks operated by different carriers.
  • Super user software applications provided by the mobile device manufacturer, for example, or some other source trusted by all domains, are members of multiple domains and thus present a unified view of data across multiple domains. This is useful in such software applications as an Address Book software application used to view and manage a contacts store on a mobile device. Such super user software applications have access to multiple domains, but also preferably respect the security of each domain. For example, a synchronization software application might access all data but only backs up domain data through the appropriate domain pipe. In order to avoid duplication of super user software application code on a mobile device, super user software applications may be outside the domains to which they have access, and effectively assume domain membership from time to time, as required. Super user software applications may therefore reside in a particular super user domain, or possibly in a part of a software applications store that is not associated with any particular domain.
  • The mobile device 30 (FIG. 2) implies a segregation of the various stores in the memory 32 into different domain storage areas. However, it should be appreciated that implementation of domains on a mobile device may be much more flexible than would be apparent from FIG. 2. For example, entries in any of the stores in the memory 32 need not be ordered by domain. The software applications store 33 may include a first software application in domain A, followed by another software application in domain C, and then a third software application which is also in domain A. Even though the domain A software applications in this example do not occupy contiguous locations in the software applications store 33, they are nonetheless associated with domain A.
  • FIG. 3 is a block diagram illustrating multiple domains on a wireless mobile communication device. FIG. 2 shows domains from the perspective of physical device components, whereas FIG. 3 illustrates the practical effect of domains on mobile device assets. Therefore, the actual mobile device may be the same in FIGS. 2 and 3, although domain-based secure control of a mobile device will become more apparent from FIG. 3 and the following description thereof.
  • The mobile device 52 in FIG. 3 includes an employer domain 54, a carrier domain 62, and a user domain 64, each including software applications, a communication pipe, and properties. The employer domain 54 and the user domain 64 also include contacts and messages. The employer domain 54 and the user domain 64 are respectively secured using the employer key 56 and a user key 66, as will be described in further detail below. As will be apparent from a comparison of FIGS. 2 and 3, the carrier domain 62, the employer domain 54, and the user domain 64 are similar to the domains A, B and C, respectively, in FIG. 2. A default domain 58, which contains software applications and properties, and a properties domain 68, which includes at least some of the properties stored in the properties store 39 (FIG. 2), are also shown in FIG. 3.
  • Placing a software application in a domain gives it access to domain assets, most notably the domain communication pipe(s) and domain data such as persistent data and properties. In the employer domain 54, for example, the CRM software application and the corporate messaging software application have access to the corporate communication pipe, data such as corporate contacts and messages associated with a corporate messaging account, and properties in the employer domain 54. Libraries within a domain are similarly accessible only from software applications in that domain.
  • Some software applications may be members of more than one domain. This grants the software application access to data in multiple domains. In FIG. 3, both the employer domain 54 and the user domain 64 include a messaging software application. In this case, it is desirable to have a single super user messaging software application that is a member of or has access to both domains. However, the owners of both domains would have to trust such a software application. Since the user of the mobile device has control over the user domain 64, a software application trusted by another domain could fairly easily be granted access to the user domain 64 by the user. When other domains than the user domain 64 are involved, each domain owner has to trust a super user software application and grant access to such a software application to its respective domain.
  • Software application provisioning policy is preferably set on a per domain basis, so that the domain owner can control which software applications can be loaded into a domain. There are several methods of controlling/assigning a software application to a domain. These are discussed in further detail below.
  • A communication pipe is a means of communication between the mobile device and some external entity. A particular physical transport layer, such as Universal Serial Bus (USB), Bluetooth™, a serial port, 802.11 and GPRS, can represent several logical communication pipes depending on the gateway at the other end. For example, a GPRS radio can be used to communicate with both the carrier WAP gateway in the carrier domain 62, as well as a corporate gateway through the corporate communication pipe in the employer domain 54. In this case, both the WAP gateway and the corporate communication pipe represent separate communication pipes even though they use the same physical transport. One reason for this separation is that even though the same physical transport is used, the gateways are controlled by separate stakeholders.
  • Placing a communication pipe in a domain means that the domain owner trusts that communication pipe. This is usually due to their control of the gateway or of the encryption keys that are used for communications over the communication pipe. In the case of the corporate communication pipe, the communication pipe often includes a gateway through a corporate security firewall, such that access to the communication pipe represents a possible avenue of attack against a corporate infrastructure. By placing the communication pipe inside a domain that they control, a corporate entity such as an employer restricts access to the communication pipe and reduce the likelihood of attack.
  • As described above, any data that survives the termination of the software application that created it is said to be persistent. In a more traditional computer architecture, persistent data is written to a disk or database. Information in main memory is normally not persistent and disappears when the software application exits, gracefully or otherwise, unless the software application takes explicit action to preserve the data by writing it to a persistent store. Like most computers, mobile devices have persistent and non-persistent storage. Persistent data is often shared between software applications. Such sharing of data or software application integration leads to useful and convenient features but also introduces the possibility of data theft or corruption by unscrupulous software applications.
  • Domains allow the benefits of software application integration while mitigating the risk to important data. By default, all persistent data created by a software application is placed in the same domain as the software application. Only software applications in the same domain can access this persistent data. This allows the domain owner to ensure that only trusted software applications can access persistent data. Untrusted software applications can still be loaded onto a mobile device without compromising data integrity or security.
  • Properties are persistent data that represent configuration information that is either global, domain or software application specific. Unlike most persistent data, properties allow a finer grain of access control. For example, it is possible to define a property that can be read by a software application but not modified. Properties can be placed in a domain and used to store user configuration or to set policies.
  • There may be several ways to add, modify, store, backup and restore configuration data on a mobile device. In general, known configuration data handling schemes relate to configuration data that is global to the mobile device. Handling of configuration data on a per application basis is normally left up to the software application. However, a system level domain-based mechanism for handling software application configuration data is desirable, for example, to place information about a software application in a secure location so that it can be used to define domain provisioning policy. When configuration data is removed from the control of the software application, the software application need not be trusted to set its own provisioning policy or manage its own application lifecycle.
  • As well as supporting software application provisioning, properties provide a consistent set of software application configuration services to the software application developer. These software application configuration services include automatic backup and restoring of properties, automatic generation of a user interface for editing properties, programmatic access to properties, a secure method of exchanging properties additions or changes over the air from a mobile device, and a secure and tamperproof offline properties storage mechanism. Also, by defining properties at a global scope, properties may be used to control configuration of a mobile device, not just software applications on such a device.
  • Properties are named, typed data. They are akin to resources except that they are meant to be edited, whereas software application resources are usually defined when a software application is created and are not normally changed. The name is an identifier that a software application can use to refer to a property, and the type indicates a type of data of the property. Properties may also have a description, separate from the name. Separating the description from the name allows a properties editing to be internationalized without recompiling a software application.
  • The following property identifies a server with which a software application interacts:
  • Name: Server
  • Type: String
  • Value: http://sap.server.net/crm
  • Description: CRM Server.
  • This property might be used by a CRM software application on a mobile device that accesses data on a corporate server. The CRM software application is loaded in the employer domain 54 in FIG. 3. The server property, required by the CRM software application, is also placed or created in the employer domain 54.
  • Properties preferably have access control. Not all properties can be read or modified by all software applications or stakeholders on a mobile device. For example, the CRM software application is able to read the name of the CRM server in the value field of the server property, but cannot modify it. Additionally, the ability to modify the server URL may be reserved for the employer or corporate IT department. This is particularly important when application properties are tied to system resources. For example, if a mobile device security firewall uses an application property to allow or deny access to a corporate gateway through the corporate communication pipe, then it would be important to prevent the software application from modifying this property. In this case, the software application cannot generate a user interface to allow editing this property, since it cannot modify the property. For this reason, it is important to have a trusted application generate the user interface for editing application properties. This trusted software application or Property Editor ensures that properties are properly labelled, to prevent a user being misled into modifying a property, and that access control rules are enforced. Each property may have access control rules for each software application, as well as for each of the stakeholders on a mobile device. Since properties may be included in every domain on a mobile device, a Property Editor is preferably implemented as a super user software application and thereby granted access to the properties in multiple domains.
  • For example, the following property allows a software application to read but not modify or write to the property. A user or a domain is able to both read and write to the property. Global rights are normally associated with a mobile device owner, which is not necessarily the user, such as when the mobile device was provided to a user by an employer. In this example, global rights include reading, but not writing to, the property.
  • Name: HTTPAccess
  • Type: Boolean
  • Value: false
  • Description: Allow HTTP Access
  • Application: +read, −write
  • User: +read, +write
  • Domain: +read, +write
  • Global: +read, −write
  • Properties are preferably defined within a scope. Valid scopes, as shown in the properties store 39 in FIG. 2, may include global, domain and application. When a software application requests a list of properties, it gets all readable global properties, all readable properties in the software application's domain, assuming the software application is a member of a domain, and all readable application properties for the software application. In general, any readable properties which may affect the software application are provided in such a list. The properties placed within a domain may include application properties for the software applications within the domain, as well as domain properties. Global properties are placed in a separate properties domain 68, which is preferably accessible to all mobile device software applications, regardless of the domain in which each software application exists.
  • Access rules may also be applied to control the creation of new properties of any particular scope. For example, the following definition of global scope indicates that global properties may be created by a user but not a software application:
  • Scope: Global
  • Application: −create
  • User: +create.
  • Domain scope properties for a particular domain may be defined, for example, as:
  • Scope: Domain
  • Name: Employer
  • Application: +create
  • User: −create,
  • Which means that software applications in the employer domain can create new properties in that domain. A user cannot create new employer domain properties in this example.
  • Software applications have programmatic access to read properties, and possibly to modify and create properties. New properties can be created in any of the software application's scopes, subject to scope access rules. By default, new properties created by a software application preferably have application scope.
  • As described above, a trusted software application, a Property Editor, generates a user interface for editing properties. Since software applications may be able to modify and create properties, there should be a way to programmatically invoke the Property Editor. For example, each software application may have a menu item called “Options” that can be selected to invoke the Property Editor. When invoked from within a software application, the property editor does not display properties that cannot be read by the software application. Properties that cannot be modified by the software application are displayed in a read only mode.
  • The Property Editor may group properties into multiple pages based on the scope of the properties, for example, to reduce clutter. It may be necessary to allow the software application to define property groups as a hint to the Property Editor in the case where there are too many properties to fit on a single page.
  • Like other domain data, properties can preferably be backed up and restored through one or more communication pipes, such as through a serial port or over the air. In reference to FIG. 2, backup and restore operations may be performed using the wireless transceiver 48 or the interface/connector 50.
  • Backup through an interface or connector such as a serial port may be initiated by a PC or other device with which a mobile device communicates. All application properties may be backed up by default, so that no serialization code is needed in the software applications. As well, any property data, and other domain data, that is stored to a disk may be digitally signed and encrypted before being sent to the mobile device. This prevents tampering with the property data as a way to circumvent the access control mechanisms.
  • Over the air backup and restore may be initiated either by a mobile device or by a remote server or system. Mobile device-initiated backup and restore are important for transports that do not support sending data to a device without first requesting such data. For example, if the device can only access a remote network through a WAP gateway, the user initiates a backup of the device. This could be done by explicit user action or by setting up a timer. Over the air restoration allows restoring properties to the last saved state. Again, this could be explicitly initiated by the user as part of a device recovery task.
  • Server initiated backup and restore are forms of remote control of a mobile device. Where the path to the device allows server-initiated communication, the properties can be completely controlled from a remote server. Remote server actions may include, for example creating a property, modifying a property, deleting a property, getting a list of properties (globally or software application specific), and getting a list of software applications on a mobile device.
  • One purpose of domains is to define a restricted set of objects with a common trust relationship. In general, no access to domain software applications or data is granted to external entities, but all members of a domain are completely trusted. As described above, however, properties have a further level of access control. Although certain software applications may span several domains, such a software application may only access a domain if it is trusted and has been granted access to the domain by the owner of that domain.
  • The fundamental domain operations that are controlled are creating and deleting domains, managing software applications (installing and deleting), managing properties (creating, reading, modifying), and access to persistent data (creating, reading, modifying). A finer grained control can be achieved by introducing additional domains, subdomains or domain libraries.
  • A subdomain is a domain that lies within another domain. Members of a subdomain inherit all of the privileges of the parent domain. An example of a subdomain would be a human resources (HR) subdomain within the employer domain 54. All software applications within the employer domain 54, including those in the HR domain, can access the company directory on a corporate network through the corporate data pipe, but only software applications in the HR domain may be able to access personal information on the corporate network. This allows different levels of trust within a domain while sharing some common resources.
  • If a code library is a member of a domain, then it may be used to grant restricted access to domain data to software applications outside the domain. This allows a domain owner to write their own access control rules and use them to grant limited access to domain data through the library. By default, domain libraries do not allow non-domain software applications to make calls to domain libraries, but the domain owner could relax this restriction on a per library basis. In this sense, a domain library that is accessible to software applications outside a domain is analogous to a domain controller in that it controls access to domain assets or resources associated with the library. Such a domain library permits implementation of a finer granularity of domain access control or more complex access rules for a particular domain, or for specific assets or resources within a domain.
  • In order for domain operations to be secure, domain policies control how objects become members of a domain. There are several different possible domain policies, each of which relies on a different trusted entity.
  • Perhaps the simplest domain policy is to allow objects to place themselves into a domain. This relies on the unlikelihood of an untrusted entity knowing about the domain. Information received at a mobile device is placed into a domain indicated in the received information or possibly control information received with the information.
  • Another relatively simple scheme is to trust the communication pipe. This means that anything received over a domain communication pipe is placed in that domain. This works well when the domain owner can control the pipe, as is the case with the carrier domain 62, for example. Referring to both FIG. 2 and FIG. 3, where domain A of FIG. 2 corresponds to the carrier domain 62 in FIG. 3, this type of domain policy is specified as shown in the domain policy store 36. When information is received over the WAP gateway (pipe A), the domain controller 40 determines that it belongs to domain A, the carrier domain 62, and places the information in that domain. The domain controller 40 accesses the domain policy store 36 to determine whether the domain for the communication pipe over which the information was received is configured for a trust the pipe domain policy. The domain controller 40 may determine the domain for the communication pipe by consulting the communication pipe table 38. Where the API 41 is provided for transferring data between the domain controller 40 and any communication pipe in the communication pipe table 38, the communication pipe table may indicate to the domain controller 40 the domain to which the communication pipe belongs. It is also possible that received information may include an indicator of the domain in which it should be placed. The domain controller 40 then accesses the domain policy store 36 to determine the domain policy in effect for that domain.
  • A stronger method of domain security relies on cryptography. In a public key system, each domain has an associated public and private key. Anything that is added to a domain must be digitally signed using the domain private key. Only digital signatures generated using the domain private key can be verified using the domain public key, such as the keys B and C, 56 and 66. This allows domain information to arrive through any pipe.
  • For example, an employer would normally want to ensure that the creation and control of the employer domain 54 is secure. A secure connection is preferably established between the mobile device 52 and the employer system before a create domain message is sent to the mobile device 52. A secure connection could be established through encryption of the create domain message or other cryptographic techniques, or using a secure communication protocol between the employer system and the mobile device 52. Encryption may involve public key cryptographic operations, or “shared secret” type cryptography. Secure domain creation techniques may also be used by other stakeholders to securely create domains on the mobile device.
  • In order to ensure that all information for the employer domain is authentic, both when the employer domain is created and when software applications or data are subsequently to be placed in the employer domain, information destined for the employer domain is digitally signed using a signature private key of the employer, and the mobile device 52 then verifies the digital signature before it places the data and software applications in the employer domain.
  • Digital signature schemes generally involve some sort of transformation of digitally signed information to provide for checking the integrity of the information and authentication of a source of the signed information. For example, according to one digital signature scheme, a digest of information to be digitally signed is first generated using a non-reversible digest algorithm or transformation. Known digest algorithms include Secure Hashing Algorithm 1 (SHA-1) and Message-Digest algorithm 5 (MD5). Other digest techniques that produce a unique digest for each unique input may also be used. The digest is then further transformed using a signer's signature private key and a signature algorithm to generate a digital signature. In order to provide for digital signature verification, signature algorithms are normally reversible, but only when a signature public key corresponding to the signature private key is used. If the signed information has been changed after it was signed, or the digital signature was generated using any key other than the signer's signature private key, then signature verification using the signer's signature public key fails.
  • In the context of secure domain control on the mobile device 52, a domain owner digitally signs any information destined for a domain on the mobile device 52 using a signature private key. At the mobile device 52, the information is not placed in the domain unless the digital signature is verified using the domain owner's signature public key 56 or 66 for the domain. Referring again to both FIGS. 2 and 3, and specifically to the employer domain 54 (domain B), when digitally signed information is received by the mobile device 30, the domain controller 40 determines the domain for which the information is destined. The domain controller 40 may determine the appropriate domain by accessing the communication pipes table 38, or based on a domain indication either from the API 41 in the communication pipes table 38 or in the received information. Since cryptographic or “trust the key” domain policies facilitate receipt of data for a particular domain over other than the communication pipe(s) in that domain, a domain indication in received information may be particularly useful in conjunction with this type of domain policy. Once the appropriate domain has been identified, the domain controller 40 then retrieves the corresponding key for the domain, key B in this example, from the key store 31. The information is placed in the domain where the digital signature is verified using the key B. The received information may be discarded, or possibly placed in the default domain 58 if the digital signature is not verified. The operations of the domain controller 40 are similar for other domains having a trust the key domain policy, such as the user domain 64 (domain C).
  • As those skilled in the art of public key cryptography will appreciate, where a public key is not stored on a mobile device, it is obtained from a public key repository if it is not available in the key store 31 when required. It should also be appreciated that other cryptographic access control mechanisms are possible, using cryptographic challenges and responses or shared secret keys, for example.
  • When digital signature verification for received software applications or data fails, or software applications or data have not been signed, the software applications or data may be placed in a default domain 58. The default domain 58 includes software applications and properties and possibly allows access to unrestricted device assets or resources. A default domain such as 58 may also provide temporary storage of unsigned or improperly signed software applications and data. Any software applications and data in the default domain 58 could then be placed into a user-controlled domain at a later time. In order to prevent denial of service type attacks exploiting the default domain 58, resources available to the default domain 58 are preferably limited. By limiting the amount of memory that objects in the default domain 58 may occupy, for example, inundating a mobile device with unsigned or improperly signed information cannot deplete the amount of memory available to other domains on the mobile device to such a degree as to render the mobile device or software applications in other domains inoperable.
  • As a further alternative domain policy, when a domain is created, it may include an access list established by the domain owner that describes all allowable members. This works well with software applications, but becomes complex where control of persistent data is required. A hybrid scheme where data is verified by some other method might be appropriate here.
  • If a domain owner trusts the holder of the device, or the holder of the device is the domain owner, then each new object could be placed in the domain by some on-device user interface, dependent upon a prompt to the user. According to this domain policy, when a software application or other domain data is received at a mobile device, the user either accepts the software application or data and places it in a domain or rejects the software application or data.
  • It may make sense to use different security techniques for different types of objects. For example, domain creation may be controlled cryptographically. However, once a domain is established, it may trust the domain pipe for further domain changes. Different domains might also use different security measures. Since the user domain 64 is controlled by the user of the mobile device 52, the user may be prompted to accept or reject software applications and data for the user domain 64, whereas the employer domain 54 and the, carrier domain 62, as shown, use a cryptographic domain policy and a trust the pipe domain policy, respectively.
  • In regard to creating new domains, different control mechanisms could also be applied. As described above, new domains could be created in response to requests from a stakeholder, possibly subject to acceptance by the user. Domain creation could be further restricted by trusting the mobile device manufacturer. The device manufacturer could set up domains when the mobile device is manufactured. When a particular component of a mobile device is configured to store information, then that component could be manufactured with certain domains. This technique applies to GPRS mobile devices, for example, which require a Subscriber Identity Module or SIM for operation. Domains could be configured on a SIM by a SIM manufacturer, owner or other stakeholder before the SIM is provided to a user.
  • FIG. 4 is a flow diagram showing a method for secure control of a wireless mobile communication device. The method begins at step 70, where a request to perform an operation is received at the mobile device. The mobile device 30 (FIG. 2), for example, may receive such a request through the wireless transceiver 48, from a UI 46, through the interface/connector 50, or from a software application running on the mobile device 30. A received request is then passed to a domain controller 40 (FIG. 2), which determines in which domain the assets or resources affected by the requested operation are located. Referring again to FIG. 2, if the request is a memory access request by a software application to read record 1 in the persistent data store 37, then the domain controller 40 determines that record 1 belongs to domain A. In FIG. 2, a domain identifier or indicator is stored with each record in the persistent data store 37. Objects in other stores may similarly include such a domain identifier to allow the domain controller to determine the domain to which an object belongs. For domains with cryptographic or trust the key domain policies, digitally signed domain data, which may include software applications, properties, persistent data, or other information, that is, received by the mobile device 30 may be stored in signed form. The domain controller 40 can then confirm that an object is trusted by a particular domain by verifying the digital signature stored with the object using the appropriate cryptographic key. The domain controller 40 may also be configured to establish and maintain or at least consult an access control list that specifies associations between domains and the objects that have been granted access to the domains. Different domains on a mobile device may also use different schemes for indicating domain membership, provided the domain controller on the mobile device is configured to handle such different schemes.
  • At step 74, the domain controller determines whether the requested operation is permitted. This determination involves determining the domain from which the received request originated. As described above, each member of a domain is trusted and has access to assets within that domain. The requested operation is completed at step 76 where the operation is permitted. In the above example of a request from a software application to read record 1, the read operation is completed where the requesting software application is in domain A, the same domain as the record to be read. The domain controller 40 may determine, and possibly confirm, the domain from which a request originates substantially as described above in the context of determining the domain to which an asset belongs. Where the operation is not permitted, the operation is denied at step 78, and error processing operations, if any, are performed at step 80. Error processing operations at step 80 may include, for example, returning an error or failure indication to the requesting object and displaying an error message to a user of the mobile device.
  • The determination at step 74 may include further or alternative operations beyond determining whether the received request originated from the same domain as the domain assets affected by the requested operation. A “same domain” determination represents but one example of how a trust relationship might be verified. In the case of a super user software application, the software application might not belong to any particular domain. Therefore, instead of determining an originating domain, a domain controller determines whether the super user software application is trusted and has been granted access to the affected domain assets by the domain owner. Also, as described above, properties may have additional access rules. As such, when a requested operation affects properties, further criteria may be applied at step 74 to determine whether the operation is permitted. Domain policies may also be examined by a domain controller at step 74, where the received request relates to new domain data that is to be placed into an existing domain. If the request is a create domain message, then step 74 may involve interaction with a user to accept or reject a new domain.
  • Although the method in FIG. 4 has been described primarily in the context of a read operation as an example of a controlled operation, it should be apparent that other operations may be similarly controlled. Domain assets thereby remain protected from objects in other domains, and may be accessed only by trusted objects in the same domain or super user software applications that are trusted by multiple domains. When data is to be sent using a particular domain's communication pipe, for example, the domain controller first determines whether an object or domain attempting to send the data has been granted access to the communication pipe by the domain owner, such as by determining whether the sending object or domain is in the same domain as the communication pipe. The domain controller 40 accesses the communication pipes table 38 to determine to which domain a communication pipe belongs, and then send data to the communication pipe via the API 41 where the sending object in that same domain or has been granted access to the communication pipe in that domain by the domain owner.
  • The method shown in FIG. 4 relates to control of a mobile device based on domains. Global, domain, or application properties are used to establish further controls, as described above. The processing of a request for an operation may therefore also or instead involve checking such properties to determine if an operation is permitted. Although a software application might have access to a communication pipe in a domain, an application property might indicate that the software application has expired, or a global property may specify that the software application cannot send data from the mobile device. Although properties are included in the domains shown in FIGS. 2 and 3 and affect operations associated with domains, property-based control may be implemented separately from domain-based control. For example, where an operation is to be performed by a software application, the application properties associated with software application may first be accessed to determine whether the operation is permitted for the software application. A request for the operation is then sent to a domain controller only if the application properties permit the operation by the software application. In this example, application properties provide a first level of control, and domains provide a further level of control. It should be appreciated, however, that either property-based control or domain-based control may be implemented on a mobile device. Although these control schemes complement each other, they can instead be independent.
  • Having described domains, properties and related security mechanisms, domain- and property-based services and uses will now be described.
  • Since a domain describes a set of data and possibly a communication pipe, the communication pipe is used to perform a backup operation on a domain. This involves sending all of the domain data, including properties and software applications, over the communication pipe to a backup system or server. Similarly, as part of a device recovery plan, the backup system or server is used to re-establish the domain on the mobile device and restore all of the data. In this case, the domain defines what should be backed up, as well as the trusted communication path to use. Domains that do not include a communication pipe may be backed up through another available data pipe or transport that has not been assigned to a domain. Digital signing and encryption techniques, when used during backup and restore operations, ensure security and integrity of domain data.
  • It is also possible to place objects from multiple domains into single container classes. When a software application requests an iterator on such a class, it enumerates only the elements in the proper domain. Super user software applications, such as an Address Book software application, should be able to request an iterator for a particular domain. This makes it easy to write a software application where the user requests a domain specific view on the data. For example, the Address Book could be configured to display only contacts in the employer domain 54.
  • Super user software applications that span domains also assume domain membership for a finite period of time. This allows a super user software application to act on the behalf of a domain without having to duplicate code that enforces domain access control. An example where this might be useful is in a data synchronization software application. When it is backing up a domain, such a software application assumes membership in that domain. This allows the underlying operating system to ensure that domain data is only written to the domain communication pipe.
  • One of the primary uses for domains is to provide data security. By placing a software application in a domain, access to that software application's data is restricted to other software applications in that domain. Levels of security within a single organization can be represented by multiple domains or by subdomains. Where the enforcement of domain policies is performed by a mobile device system such as a JVM and not a software application, bad programming on the part of the developer is less likely to result in a security breach.
  • Domains are also useful in over the air software application provisioning for mobile devices. Where each stakeholder is provided with a respective domain, software applications installed in one domain do not affect mobile device assets, software applications, or data in other domains. Thus, neither a carrier providing communication services to a mobile device nor an employer as an owner of a mobile device need be concerned that user software applications installed in a user domain on the mobile device will affect carrier domain assets, software applications or data or corporate assets, software applications or data. Software application provisioning may also include loading of configuration data for a software application in the form of application properties. Other aspects of software applications on a mobile device are also controllable using application properties. A domain owner, such as a service provider, may specify that a software application may be executed only a specific number of times, only a specific number of times in a certain time period, or only a specific number of times before service charges apply. By placing properties within domains, a stakeholder maintains secure control over domain assets, including software applications in the domain.
  • Just as properties can be mapped to mobile device resource access such as HTTP access and, phone access, for example, they can also be mapped to device state information, including information on available memory and date and time of last mobile device reset. This allows remote querying of the mobile device state. Such a query could be initiated by a device management server or be triggered by a timer on the mobile device. By querying these system-mapped properties, a server can remotely manage the mobile device. Some of these properties will be local to a domain, such as a maximum number of recipients per message, and some will be global to the device, the minimum length of a password, for example.
  • FIG. 5 is a block diagram of an example wireless mobile communication device. The mobile device 500 is preferably a two-way communication device having at least voice and data communication capabilities. The mobile device 500 preferably has the capability to communicate with other computer systems on the Internet. Depending on the functionality provided by the mobile device, the mobile device may be referred to as a data messaging device, a two-way pager, a cellular telephone with data messaging capabilities, a wireless Internet appliance, or a data communication device (with or without telephony capabilities). As mentioned above, such devices are referred to generally herein simply as mobile devices.
  • The mobile device 500 includes a transceiver 511, a microprocessor 538, a display 522, Flash memory 524, RAM 526, auxiliary input/output (I/O) devices 528, a serial port 530, a keyboard 532, a speaker 534, a microphone 536, a short-range wireless communications sub-system 540, and may also include other device sub-systems 542. The transceiver 511 preferably includes transmit and receive antennas 516, 518, a receiver (Rx) 512, a transmitter (Tx) 514, one or more local oscillators (LOs) 513, and a digital signal processor (DSP) 520. Within the Flash memory 524, which may alternatively be another type of non-volatile store such as a battery backed-up RAM, the mobile device 500 preferably includes a plurality of software modules 524A-524N that can be executed by the microprocessor 538 (and/or the DSP 520), including a voice communication module 524A, a data communication module 524B, and a plurality of other operational modules 524N for carrying out a plurality of other functions.
  • The mobile device 500 is preferably a two-way communication device having voice and data communication capabilities. Thus, for example, the mobile device 500 may communicate over a voice network, such as any of the analog or digital cellular networks, and may also communicate over a data network. The voice and data networks are depicted in FIG. 5 by the communication tower 519. These voice and data networks may be separate communication networks using separate infrastructure, such as base stations, network controllers, etc., or they may be integrated into a single wireless network. References to the network 519 should therefore be interpreted as encompassing both a single voice and data network and separate networks.
  • The communication subsystem 511 is used to communicate with the network 519. The DSP 520 is used to send and receive communication signals to and from the transmitter 514 and receiver 512, and may also exchange control information with the transmitter 514 and receiver 512. If the voice and data communications occur at a single frequency, or closely-spaced set of frequencies, then a single LO 513 may be used in conjunction with the transmitter 514 and receiver 512. Alternatively, if different frequencies are utilized for voice communications versus data communications, then a plurality of LOs 513 can be used to generate a plurality of frequencies corresponding to the network 519. Although two antennas 516, 518 are depicted in FIG. 5, the mobile device 500 could be used with a single antenna structure. Information, which includes both voice and data information, is communicated to and from the communication module 511 via a link between the DSP 520 and the microprocessor 538.
  • The detailed design of the communication subsystem 511, such as frequency band, component selection, power level, etc., will be dependent upon the communication network 519 in which the mobile device 500 is intended to operate. For example, a mobile device 500 intended to operate in a North American market may include a communication subsystem 511 designed to operate with the Mobitex or DataTAC mobile data communication networks and also designed to operate with any of a variety of voice communication networks, such as AMPS, TDMA, CDMA, PCS, etc., whereas a mobile device 500 intended for use in Europe may be configured to operate with the GPRS data communication network and the GSM voice communication network. Other types of data and voice networks, both separate and integrated, may also be utilized with the mobile device 500.
  • Depending upon the type of network 519, the access requirements for the mobile device 500 may also vary. For example, in the Mobitex and DataTAC data networks, mobile devices are registered on the network using a unique identification number associated with each device. In GPRS data networks, however, network access is associated with a subscriber or user of the mobile device 500. A GPRS device typically requires a SIM in order to operate the mobile device 500 on a GPRS network. Local or non-network communication functions (if any) may be operable, without the SIM, but the mobile device 500 will be unable to carry out any functions involving communications over the network 519, other than any legally required operations, such as ‘911’ emergency calling. As described above, domains may be established on a SIM before it is provided to a user, with further domains possibly being added to a SIM after it has been installed in a mobile device. When a GPRS device also includes a memory component, domains may exist on the memory component and the SIM. Different types of domain control and domain policies could be implemented depending upon the location of a domain.
  • After any required network registration or activation procedures have been completed, the mobile device 500 may send and receive communication signals, preferably including both voice and data signals, over the network 519. Signals received by the antenna 516 from the communication network 519 are routed to the receiver 512, which provides for signal amplification, frequency down conversion, filtering, channel selection, analog to digital conversion, etc. Analog to digital conversion of the received signal allows more complex communication functions, such as digital demodulation and decoding to be performed using the DSP 520. In a similar manner, signals to be transmitted to the network 519 are processed, including modulation and encoding, for example, by the DSP 520 and are then provided to the transmitter 514 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 519 via the antenna 518. Although a single transceiver 511 is shown in FIG. 5 for both voice and data communications, it is possible that the mobile device 500 may include two distinct transceivers, such as a first transceiver for transmitting and receiving voice signals, and a second transceiver for transmitting and receiving data signals, or a first transceiver configured to operate within a first frequency band, and a second transceiver configured to operate within a second frequency band.
  • In addition to processing the communication signals, the DSP 520 may also provide for receiver and transmitter control. For example, the gain levels applied to communication signals in the receiver 512 and transmitter 514 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 520. Other transceiver control algorithms could also be implemented in the DSP 520 in order to provide more sophisticated control of the transceiver 511.
  • The microprocessor 538 preferably manages and controls the overall operation of the mobile device 500. Many types of microprocessors or microcontrollers could be used here, or, alternatively, a single DSP 520 could be used to carry out the functions of the microprocessor 538. Low-level communication functions, including at least data and voice communications, are performed through the DSP 520 in the transceiver 511. Other, high-level communication software applications, such as a voice communication software application 524A, and a data communication software application 524B may be stored in the Flash memory 524 for execution by the microprocessor 538. For example, the voice communication module 524A may provide a high-level user interface operable to transmit and receive voice calls between the mobile device 500 and a plurality of other voice devices via the network 519. Similarly, the data communication module 524B may provide a high-level user interface operable for sending and receiving data, such as e-mail messages, files, organizer information, short text messages, etc., between the mobile device 500 and a plurality of other data devices via the network 519.
  • The microprocessor 538 also interacts with other device subsystems, such as the display 522, Flash memory 524, random access memory (RAM) 526, auxiliary input/output (I/O) subsystems 528, serial port 530, keyboard 532, speaker 534, microphone 536, a short-range communications subsystem 540 and any other device subsystems generally designated as 542. For example, the modules 524A-N are executed by the microprocessor 538 and may provide a high-level interface between a user of the mobile device and the mobile device. This interface typically includes a graphical component provided through the display 522, and an input/output component provided through the auxiliary I/O 528, keyboard 532, speaker 534, or microphone 536. Such interfaces are designated generally as UI 46 in FIG. 2.
  • Some of the subsystems shown in FIG. 5 perform communication-related functions, whereas other subsystems may provide “resident” or on-device functions. Notably, some subsystems, such as keyboard 532 and display 522 may be used for both communication-related functions, such as entering a text message for transmission over a data communication network, and device-resident functions such as a calculator or task list or other PDA type functions.
  • Operating system software used by the microprocessor 538 is preferably stored in a persistent store such as Flash memory 524. In addition to the operating system and communication modules 524A-N, the Flash memory 524 may also include a file system for storing data. The Flash memory 524 may also include data stores for application, domain and global properties. The operating system, specific device software applications or modules, or parts thereof, may be temporarily loaded into a volatile store, such as RAM 526 for faster operation. Moreover, received communication signals may also be temporarily stored to RAM 526, before permanently writing them to a file system located in the Flash memory 524. Although the device 500 includes a Flash memory 524 as a non-volatile store, it should be appreciated that Flash memory represents one example of a non-volatile memory. Other memory arrangements, such as battery backed-up RAM, for example, may be used instead of the Flash memory 524.
  • An exemplary software application module 524N that may be loaded onto the mobile device 500 is a PIM software application providing PDA functionality, such as calendar events, appointments, and task items. This module 524N may also interact with the voice communication module 524A for managing phone calls, voice mails, etc., and may also interact with the data communication module 524B for managing e-mail communications and other data transmissions. Alternatively, all of the functionality of the voice communication module 524A and the data communication module 524B may be integrated into the PIM module.
  • The Flash memory 524 preferably provides a file system to facilitate storage of PIM data items on the device. The PIM software application preferably includes the ability to send and receive data items, either by itself, or in conjunction with the voice and data communication modules 524A, 524B, via the wireless network 519. The PIM data items are preferably seamlessly integrated, synchronized and updated, via the wireless network 519, with a corresponding set of data items stored or associated with a host computer system, thereby creating a mirrored system for data items associated with a particular user.
  • The mobile device 500 may also be manually synchronized with a host system by placing the mobile device 500 in an interface cradle, which couples the serial port 530 of the mobile device 500 to the serial port of the host system. The serial port 530 may also be used to download other software application modules 524N, properties, and data to one or more domains on the mobile device 500. This wired download path may further be used to load an encryption key onto the mobile device 500 for use in secure communications, which is a more secure method than exchanging encryption information via the wireless network 519.
  • Additional software application modules 524N, properties and data may also be loaded to domains on the mobile device 500 through the network 519, through an auxiliary I/O subsystem 528, through the short-range communications subsystem 540, or through any other suitable subsystem 542, and installed by a user in the Flash memory 524 or RAM 526. Such flexibility in software application installation increases the functionality of the mobile device 500 and may provide enhanced on-device functions, communication-related functions, or both. For example, secure communication software applications may enable electronic commerce functions and other such financial transactions to be performed using the mobile device 500.
  • When the mobile device 500 is operating in a data communication mode, a received signal, such as a text message or a web page download, will be processed by the transceiver 511 and provided to the microprocessor 538, which will preferably further process the received signal for output to the display 522, or, alternatively, to an auxiliary I/O device 528. A user of mobile device 500 may also compose data items, such as email messages, using the keyboard 532, which is preferably a complete alphanumeric keyboard laid out in the QWERTY style, although other styles of complete alphanumeric keyboards such as the known DVORAK style may also be used. User input to the mobile device 500 is further enhanced with a plurality of auxiliary I/O devices 528, which may include a thumbwheel input device, a touchpad, a variety of switches, a rocker input switch, etc. The composed data items input by the user may then be transmitted over the communication network 519 via the transceiver 511. Where the data communication module 524B is in a particular domain, received and composed data items would preferably be stored in that domain, and the composed data items would also be sent over the domain data pipe.
  • When the mobile device 500 is operating in a voice communication mode, the overall operation of the mobile device 500 is substantially similar to the data mode, except that received signals are preferably output to the speaker 534, voice signals for transmission are generated by a microphone 536, and a different domain data pipe and assets may be used. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on the mobile device 500. Although voice or audio signal output is preferably accomplished primarily through the speaker 534, the display 522 may also be used to provide an indication of the identity of a calling party, the duration of a voice call, or other voice call related information. For example, the microprocessor 538, in conjunction with the voice communication module 524A and the operating system software, may detect the caller identification information of an incoming voice call and display it on the display 522.
  • A short-range communications subsystem 540 may also be included in the mobile device 500. For example, the subsystem 540 may include an infrared device and associated circuits and components, or a Bluetooth or 802.11 short-range wireless communication module to provide for communication with similarly-enabled systems and devices. Thus, owner information insertion, owner control information insertion, and software application loading operations as described above may be enabled on the mobile device 500 via the serial port 530 or other short-range communications subsystem 540.
  • It will be appreciated that the above description relates to preferred embodiments by way of example only. Many variations on the systems and methods described above will be obvious to those knowledgeable in the field, and such obvious variations are within the scope of the invention as described and claimed, whether or not expressly described.
  • INDUSTRIAL APPLICABILITY
  • The invention provides improved security for wireless mobile communication devices.

Claims (1)

What is claimed is:
1. A method comprising:
storing corporate data and other data on a wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device;
receiving, via a communication pipe, a request to access the corporate data; and
controlling access, through a security firewall, to the corporate data based on whether the communication pipe is determined to be in the corporate domain by using a cryptographic key.
US16/025,583 2002-08-19 2018-07-02 System and method for secure control of resources of wireless mobile communication devices Expired - Lifetime US10298584B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/025,583 US10298584B2 (en) 2002-08-19 2018-07-02 System and method for secure control of resources of wireless mobile communication devices
US16/415,702 US10999282B2 (en) 2002-08-19 2019-05-17 System and method for secure control of resources of wireless mobile communication devices

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US40412002P 2002-08-19 2002-08-19
PCT/CA2003/001245 WO2004017592A1 (en) 2002-08-19 2003-08-19 System and method for secure control of resources of wireless mobile communication device
US52435305A 2005-02-14 2005-02-14
US13/371,093 US8661531B2 (en) 2002-08-19 2012-02-10 System and method for secure control of resources of wireless mobile communication devices
US14/188,345 US8893266B2 (en) 2002-08-19 2014-02-24 System and method for secure control of resources of wireless mobile communication devices
US14/543,324 US9391992B2 (en) 2002-08-19 2014-11-17 System and method for secure control of resources of wireless mobile communication devices
US15/207,125 US10015168B2 (en) 2002-08-19 2016-07-11 System and method for secure control of resources of wireless mobile communication devices
US16/025,583 US10298584B2 (en) 2002-08-19 2018-07-02 System and method for secure control of resources of wireless mobile communication devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/207,125 Continuation US10015168B2 (en) 2002-08-19 2016-07-11 System and method for secure control of resources of wireless mobile communication devices

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/415,702 Continuation US10999282B2 (en) 2002-08-19 2019-05-17 System and method for secure control of resources of wireless mobile communication devices

Publications (2)

Publication Number Publication Date
US20180316678A1 true US20180316678A1 (en) 2018-11-01
US10298584B2 US10298584B2 (en) 2019-05-21

Family

ID=31888326

Family Applications (8)

Application Number Title Priority Date Filing Date
US10/524,353 Active 2026-01-26 US8544084B2 (en) 2002-08-19 2003-08-19 System and method for secure control of resources of wireless mobile communication devices
US13/371,093 Expired - Lifetime US8661531B2 (en) 2002-08-19 2012-02-10 System and method for secure control of resources of wireless mobile communication devices
US14/188,345 Expired - Lifetime US8893266B2 (en) 2002-08-19 2014-02-24 System and method for secure control of resources of wireless mobile communication devices
US14/543,324 Expired - Fee Related US9391992B2 (en) 2002-08-19 2014-11-17 System and method for secure control of resources of wireless mobile communication devices
US15/207,140 Expired - Lifetime US9998466B2 (en) 2002-08-19 2016-07-11 System and method for secure control of resources of wireless mobile communication devices
US15/207,125 Expired - Lifetime US10015168B2 (en) 2002-08-19 2016-07-11 System and method for secure control of resources of wireless mobile communication devices
US16/025,583 Expired - Lifetime US10298584B2 (en) 2002-08-19 2018-07-02 System and method for secure control of resources of wireless mobile communication devices
US16/415,702 Expired - Lifetime US10999282B2 (en) 2002-08-19 2019-05-17 System and method for secure control of resources of wireless mobile communication devices

Family Applications Before (6)

Application Number Title Priority Date Filing Date
US10/524,353 Active 2026-01-26 US8544084B2 (en) 2002-08-19 2003-08-19 System and method for secure control of resources of wireless mobile communication devices
US13/371,093 Expired - Lifetime US8661531B2 (en) 2002-08-19 2012-02-10 System and method for secure control of resources of wireless mobile communication devices
US14/188,345 Expired - Lifetime US8893266B2 (en) 2002-08-19 2014-02-24 System and method for secure control of resources of wireless mobile communication devices
US14/543,324 Expired - Fee Related US9391992B2 (en) 2002-08-19 2014-11-17 System and method for secure control of resources of wireless mobile communication devices
US15/207,140 Expired - Lifetime US9998466B2 (en) 2002-08-19 2016-07-11 System and method for secure control of resources of wireless mobile communication devices
US15/207,125 Expired - Lifetime US10015168B2 (en) 2002-08-19 2016-07-11 System and method for secure control of resources of wireless mobile communication devices

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/415,702 Expired - Lifetime US10999282B2 (en) 2002-08-19 2019-05-17 System and method for secure control of resources of wireless mobile communication devices

Country Status (8)

Country Link
US (8) US8544084B2 (en)
EP (1) EP1535444B1 (en)
CN (1) CN1689302B (en)
AU (1) AU2003257336A1 (en)
CA (3) CA2838205C (en)
ES (1) ES2420758T3 (en)
HK (1) HK1079361A1 (en)
WO (1) WO2004017592A1 (en)

Families Citing this family (98)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7146176B2 (en) 2000-06-13 2006-12-05 Shared Spectrum Company System and method for reuse of communications spectrum for fixed and mobile applications with efficient method to mitigate interference
IL143533A0 (en) * 2001-06-03 2002-06-30 Shichor Eliahu An audio signal scrambler for any phone, including cellular phones, employing a unique frame synchroization system
CN1689302B (en) 2002-08-19 2011-01-19 捷讯研究有限公司 System and method for secure control of resources of wireless mobile communication devices
ES2314256T3 (en) * 2002-11-08 2009-03-16 Research In Motion Limited SYSTEM AND METHOD OF CONNECTION CONTROL FOR WIRELESS MOBILE COMMUNICATION DEVICES.
US7409010B2 (en) 2003-06-10 2008-08-05 Shared Spectrum Company Method and system for transmitting signals with reduced spurious emissions
US8548429B2 (en) 2004-03-08 2013-10-01 Rafi Nehushtan Cellular device security apparatus and method
JP4465387B2 (en) 2004-04-30 2010-05-19 リサーチ イン モーション リミテッド System and method for processing data transmission
US7398474B2 (en) * 2005-01-31 2008-07-08 Microsoft Corporation Method and system for a digital device menu editor
EP1864236A1 (en) * 2005-02-17 2007-12-12 Acterna, LLC Methods and apparatuses to remotely test communications networks using digital fingerprints of content
US20060248577A1 (en) * 2005-04-29 2006-11-02 International Business Machines Corporation Using SSO processes to manage security credentials in a provisioning management system
EP1897019A4 (en) * 2005-05-13 2011-10-05 Cryptomill Technologies Ltd Cryptographic control for mobile storage means
EP1902401B1 (en) * 2005-05-13 2017-03-29 CryptoMill Inc. Content cryptographic firewall system
US7614082B2 (en) 2005-06-29 2009-11-03 Research In Motion Limited System and method for privilege management and revocation
US7675933B2 (en) * 2005-09-23 2010-03-09 Palm, Inc. System and method for enabling radio operations on a wireless computing device
US8171093B2 (en) * 2005-12-23 2012-05-01 Novation Science Holding, Llc Web to phone contact information messaging system
US7533343B2 (en) * 2005-12-23 2009-05-12 Novation Science Holding, Llc Web page to cellular phone—contact information messaging system
US20070168721A1 (en) * 2005-12-22 2007-07-19 Nokia Corporation Method, network entity, system, electronic device and computer program product for backup and restore provisioning
US8561127B1 (en) * 2006-03-01 2013-10-15 Adobe Systems Incorporated Classification of security sensitive information and application of customizable security policies
US8155649B2 (en) * 2006-05-12 2012-04-10 Shared Spectrum Company Method and system for classifying communication signals in a dynamic spectrum access system
US8184653B2 (en) 2007-08-15 2012-05-22 Shared Spectrum Company Systems and methods for a cognitive radio having adaptable characteristics
US8326313B2 (en) 2006-05-12 2012-12-04 Shared Spectrum Company Method and system for dynamic spectrum access using detection periods
US7564816B2 (en) 2006-05-12 2009-07-21 Shared Spectrum Company Method and system for determining spectrum availability within a network
US8997170B2 (en) 2006-12-29 2015-03-31 Shared Spectrum Company Method and device for policy-based control of radio
US8027249B2 (en) 2006-10-18 2011-09-27 Shared Spectrum Company Methods for using a detector to monitor and detect channel occupancy
US7822863B2 (en) * 2006-05-12 2010-10-26 Palo Alto Research Center Incorporated Personal domain controller
US9538388B2 (en) 2006-05-12 2017-01-03 Shared Spectrum Company Method and system for dynamic spectrum access
US8055204B2 (en) * 2007-08-15 2011-11-08 Shared Spectrum Company Methods for detecting and classifying signals transmitted over a radio frequency spectrum
US7814531B2 (en) * 2006-06-30 2010-10-12 Intel Corporation Detection of network environment for network access control
US7870255B2 (en) * 2006-10-03 2011-01-11 Research In Motion Limited Access control system and method for wireless application provisioning
US8134969B2 (en) * 2006-11-10 2012-03-13 Motorola Solutions, Inc. IP layer-handoff using mobility domains and IP caching
JP4406422B2 (en) * 2006-11-27 2010-01-27 株式会社東芝 Mobile radio terminal device
GB0623842D0 (en) * 2006-11-29 2007-01-10 British Telecomm Secure access
US8072953B2 (en) * 2007-04-24 2011-12-06 Interdigital Technology Corporation Wireless communication method and apparatus for performing home Node-B identification and access restriction
US9959404B2 (en) * 2007-10-01 2018-05-01 Symantec Corporation Methods and systems for creating and updating approved-file and trusted-domain databases
GB0722267D0 (en) * 2007-11-13 2007-12-27 Vodafone Plc Telecommunications device security
US8752130B2 (en) * 2007-12-21 2014-06-10 Samsung Electronics Co., Ltd. Trusted multi-stakeholder environment
US20130291091A1 (en) * 2007-12-31 2013-10-31 Motorola Mobility Llc Location Bound Secure Domains
DE502008001701D1 (en) * 2008-02-18 2010-12-16 Siemens Ag Method for operating an automation system
ES2525469T3 (en) * 2008-03-31 2014-12-23 Orange Procedure for accessing and transferring data related to an application installed in a security module associated with a mobile terminal, security module, management server and associated system
EP2319260A2 (en) 2008-08-19 2011-05-11 Shared Spectrum Company Method and system for dynamic spectrum access using specialty detectors and improved networking
US8156544B2 (en) * 2008-08-20 2012-04-10 Symbol Technologies, Inc. System and method for a WPAN firewall
WO2010027765A2 (en) * 2008-08-25 2010-03-11 Interdigital Patent Holdings, Inc. Universal integrated circuit card having a virtual subscriber identity module functionality
US9026918B2 (en) * 2008-10-16 2015-05-05 Accenture Global Services Limited Enabling a user device to access enterprise data
US20100153866A1 (en) 2008-12-11 2010-06-17 Accenture Global Services Gmbh Method and system for modifying the execution of a native application running on a portable electronic device
US7984170B1 (en) * 2009-01-29 2011-07-19 Amazon Technologies, Inc. Cross-domain communication in domain-restricted communication environments
JP5643292B2 (en) * 2009-04-20 2014-12-17 インターデイジタル パテント ホールディングス インコーポレイテッド Multiple domain systems and domain ownership
US20120079559A1 (en) * 2010-04-02 2012-03-29 Interdigital Patent Holdings, Inc. Methods for policy management
US8959451B2 (en) 2010-09-24 2015-02-17 Blackberry Limited Launching an application based on data classification
WO2012037658A1 (en) 2010-09-24 2012-03-29 Research In Motion Limited Method and apparatus for differentiated access control
US9147085B2 (en) 2010-09-24 2015-09-29 Blackberry Limited Method for establishing a plurality of modes of operation on a mobile device
US9047451B2 (en) 2010-09-24 2015-06-02 Blackberry Limited Method and apparatus for differentiated access control
US8270963B1 (en) 2010-10-01 2012-09-18 Viasat, Inc. Cross domain notification
US8458800B1 (en) 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
US8495731B1 (en) * 2010-10-01 2013-07-23 Viasat, Inc. Multiple domain smartphone
US9113499B2 (en) 2010-10-01 2015-08-18 Viasat, Inc. Multiple domain smartphone
EP2453631B1 (en) 2010-11-15 2016-06-22 BlackBerry Limited Data source based application sandboxing
WO2012078570A2 (en) * 2010-12-06 2012-06-14 Interdigital Patent Holdings, Inc. Smart card with domain-trust evaluation and domain policy management functions
US10511630B1 (en) 2010-12-10 2019-12-17 CellSec, Inc. Dividing a data processing device into separate security domains
US8763080B2 (en) 2011-06-07 2014-06-24 Blackberry Limited Method and devices for managing permission requests to allow access to a computing resource
US9053337B2 (en) 2011-06-07 2015-06-09 Blackberry Limited Methods and devices for controlling access to a computing resource by applications executable on a computing device
US8650550B2 (en) 2011-06-07 2014-02-11 Blackberry Limited Methods and devices for controlling access to computing resources
US20130039266A1 (en) 2011-08-08 2013-02-14 Research In Motion Limited System and method to increase link adaptation performance with multi-level feedback
US9424439B2 (en) 2011-09-12 2016-08-23 Microsoft Technology Licensing, Llc Secure data synchronization
US9161226B2 (en) 2011-10-17 2015-10-13 Blackberry Limited Associating services to perimeters
US9497220B2 (en) 2011-10-17 2016-11-15 Blackberry Limited Dynamically generating perimeters
US9613219B2 (en) 2011-11-10 2017-04-04 Blackberry Limited Managing cross perimeter access
US8799227B2 (en) 2011-11-11 2014-08-05 Blackberry Limited Presenting metadata from multiple perimeters
US9256758B2 (en) * 2011-11-29 2016-02-09 Dell Products L.P. Mode sensitive encryption
US9262604B2 (en) 2012-02-01 2016-02-16 Blackberry Limited Method and system for locking an electronic device
US9306948B2 (en) 2012-02-16 2016-04-05 Blackberry Limited Method and apparatus for separation of connection data by perimeter type
EP2629570B1 (en) 2012-02-16 2015-11-25 BlackBerry Limited Method and apparatus for automatic vpn login and interface selection
US9369466B2 (en) 2012-06-21 2016-06-14 Blackberry Limited Managing use of network resources
US8768847B2 (en) * 2012-06-21 2014-07-01 Microsoft Corporation Privacy enhancing personal data brokerage service
US10136030B2 (en) 2012-07-04 2018-11-20 S-Printing Solution Co., Ltd. Method and system for managing image forming apparatus through network
US10305937B2 (en) * 2012-08-02 2019-05-28 CellSec, Inc. Dividing a data processing device into separate security domains
US9294508B2 (en) 2012-08-02 2016-03-22 Cellsec Inc. Automated multi-level federation and enforcement of information management policies in a device network
US20140075502A1 (en) * 2012-09-11 2014-03-13 Selim Aissi Resource management of execution environments
US9075955B2 (en) 2012-10-24 2015-07-07 Blackberry Limited Managing permission settings applied to applications
US8656016B1 (en) 2012-10-24 2014-02-18 Blackberry Limited Managing application execution and data access on a device
WO2014117247A1 (en) 2013-01-29 2014-08-07 Blackberry Limited Managing application access to certificates and keys
US9275221B2 (en) 2013-05-01 2016-03-01 Globalfoundries Inc. Context-aware permission control of hybrid mobile applications
US9443093B2 (en) * 2013-06-20 2016-09-13 Amazon Technologies, Inc. Policy enforcement delays
WO2015021548A1 (en) * 2013-08-12 2015-02-19 Graphite Software Corporation Secure authentication and switching to encrypted domains
US10230717B2 (en) 2013-11-21 2019-03-12 Cis Maxwell, Llc Managed domains for remote content and configuration control on mobile information devices
US9171174B2 (en) 2013-11-27 2015-10-27 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for verifying user data access policies when server and/or user are not trusted
KR20150089525A (en) * 2014-01-28 2015-08-05 삼성전자주식회사 Communication Message Operating Method And Electronic Device supporting the same
AU2015240467B2 (en) 2014-04-04 2019-07-11 CellSec, Inc. Method for authentication and assuring compliance of devices accessing external services
US9397835B1 (en) * 2014-05-21 2016-07-19 Amazon Technologies, Inc. Web of trust management in a distributed system
US9692788B2 (en) * 2014-05-29 2017-06-27 Blackberry Limited Method and system for domain creation and bootstrapping
US11100242B2 (en) * 2014-05-30 2021-08-24 Apple Inc. Restricted resource classes of an operating system
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
US10491569B1 (en) * 2015-11-10 2019-11-26 Alterednets Cyber Solutions LLC Secure transfer of independent security domains across shared media
US10346628B2 (en) * 2015-12-16 2019-07-09 Architecture Technology Corporation Multi-domain application execution management
US10817593B1 (en) * 2015-12-29 2020-10-27 Wells Fargo Bank, N.A. User information gathering and distribution system
US11397935B2 (en) * 2018-04-02 2022-07-26 Hover Developer Services, Inc. System and method for wireless transactions
US10430606B1 (en) * 2018-04-30 2019-10-01 Aras Corporation System and method for implementing domain based access control on queries of a self-describing data system
US10949569B2 (en) * 2018-10-17 2021-03-16 International Business Machines Corporation Adaptive on-device storage management across multiple applications
US11102002B2 (en) * 2018-12-28 2021-08-24 Dell Products, L.P. Trust domain isolation management in secured execution environments

Family Cites Families (139)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4477526A (en) 1982-06-18 1984-10-16 E. I. Du Pont De Nemours And Company High strength aramid spun yarn
JPS6211354A (en) 1985-07-09 1987-01-20 Alpine Electron Inc Locking method for function of automobile telephone system
US5204961A (en) * 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5220604A (en) 1990-09-28 1993-06-15 Digital Equipment Corporation Method for performing group exclusion in hierarchical group structures
US5432934A (en) * 1993-07-26 1995-07-11 Gensym Corporation Access restrictions as a means of configuring a user interface and making an application secure
US5689700A (en) * 1993-12-29 1997-11-18 Microsoft Corporation Unification of directory service with file system services
US5708812A (en) * 1996-01-18 1998-01-13 Microsoft Corporation Method and apparatus for Migrating from a source domain network controller to a target domain network controller
US5768519A (en) * 1996-01-18 1998-06-16 Microsoft Corporation Method and apparatus for merging user accounts from a source security domain into a target security domain
SE507449C2 (en) 1996-03-01 1998-06-08 Ericsson Telefon Ab L M Method and apparatus for activating and automatically deactivating keypad for a mobile radio terminal
US6263442B1 (en) * 1996-05-30 2001-07-17 Sun Microsystems, Inc. System and method for securing a program's execution in a network environment
DE69735486T2 (en) 1996-07-22 2006-12-14 Cyva Research Corp., San Diego TOOL FOR SAFETY AND EXTRACTION OF PERSONAL DATA
US6292900B1 (en) * 1996-12-18 2001-09-18 Sun Microsystems, Inc. Multilevel security attribute passing methods, apparatuses, and computer program products in a stream
US5845068A (en) * 1996-12-18 1998-12-01 Sun Microsystems, Inc. Multilevel security port methods, apparatuses, and computer program products
US6393569B1 (en) * 1996-12-18 2002-05-21 Alexander S. Orenshteyn Secured system for accessing application services from a remote station
US5987611A (en) * 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6105132A (en) 1997-02-20 2000-08-15 Novell, Inc. Computer network graded authentication system and method
US6178505B1 (en) * 1997-03-10 2001-01-23 Internet Dynamics, Inc. Secure delivery of information in a network
EP1021801B1 (en) * 1997-03-24 2004-11-03 Visa International Service Association A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
NO971605L (en) * 1997-04-08 1998-10-09 Ericsson Telefon Ab L M Device for improving accessibility of services in a communication system
BR9806000A (en) * 1997-06-17 2000-01-25 Purdue Pharma Lp Self-destructive document and system for sending messages by e-mail.
US6418466B1 (en) * 1997-07-10 2002-07-09 International Business Machines Corporation Management of authentication discovery policy in a computer network
US6052735A (en) 1997-10-24 2000-04-18 Microsoft Corporation Electronic mail object synchronization between a desktop computer and mobile device
US6070244A (en) * 1997-11-10 2000-05-30 The Chase Manhattan Bank Computer network security management system
US6044467A (en) * 1997-12-11 2000-03-28 Sun Microsystems, Inc. Secure class resolution, loading and definition
US6173404B1 (en) * 1998-02-24 2001-01-09 Microsoft Corporation Software object security mechanism
US6345361B1 (en) * 1998-04-06 2002-02-05 Microsoft Corporation Directional set operations for permission based security in a computer system
US6405202B1 (en) * 1998-04-27 2002-06-11 Trident Systems, Inc. System and method for adding property level security to an object oriented database
US6772350B1 (en) * 1998-05-15 2004-08-03 E.Piphany, Inc. System and method for controlling access to resources in a distributed environment
US6396516B1 (en) * 1998-05-29 2002-05-28 Plexus Systems, Llc Graphical user interface shop floor control system
US6054987A (en) * 1998-05-29 2000-04-25 Hewlett-Packard Company Method of dynamically creating nodal views of a managed network
US6321334B1 (en) 1998-07-15 2001-11-20 Microsoft Corporation Administering permissions associated with a security zone in a computer system security model
US6292833B1 (en) 1998-07-17 2001-09-18 Openwave Systems Inc. Method and apparatus for providing access control to local services of mobile devices
US6324645B1 (en) * 1998-08-11 2001-11-27 Verisign, Inc. Risk management for public key management infrastructure using digital certificates
US6466932B1 (en) * 1998-08-14 2002-10-15 Microsoft Corporation System and method for implementing group policy
US6292798B1 (en) * 1998-09-09 2001-09-18 International Business Machines Corporation Method and system for controlling access to data resources and protecting computing system resources from unauthorized access
US6289458B1 (en) * 1998-09-21 2001-09-11 Microsoft Corporation Per property access control mechanism
US6625603B1 (en) * 1998-09-21 2003-09-23 Microsoft Corporation Object type specific access control
US6412070B1 (en) * 1998-09-21 2002-06-25 Microsoft Corporation Extensible security system and method for controlling access to objects in a computing environment
US6360322B1 (en) 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
US6957330B1 (en) * 1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling
US6668323B1 (en) 1999-03-03 2003-12-23 International Business Machines Corporation Method and system for password protection of a data processing system that permit a user-selected password to be recovered
US6463534B1 (en) 1999-03-26 2002-10-08 Motorola, Inc. Secure wireless electronic-commerce system with wireless network domain
US6223291B1 (en) * 1999-03-26 2001-04-24 Motorola, Inc. Secure wireless electronic-commerce system with digital product certificates and digital license certificates
JP2000311080A (en) * 1999-04-28 2000-11-07 Toshiba Corp Computer system and its operation environment switching method
US6594671B1 (en) * 1999-06-14 2003-07-15 International Business Machines Corporation Separating privileged functions from non-privileged functions in a server instance
US6374292B1 (en) * 1999-07-20 2002-04-16 Sun Microsystems, Inc. Access control system for an ISP hosted shared email server
US6609198B1 (en) 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US6339423B1 (en) * 1999-08-23 2002-01-15 Entrust, Inc. Multi-domain access control
US6785810B1 (en) 1999-08-31 2004-08-31 Espoc, Inc. System and method for providing secure transmission, search, and storage of data
GB9925289D0 (en) 1999-10-27 1999-12-29 Ibm Method and means for adjusting the timing of user-activity-dependent changes of operational state of an apparatus
US6775536B1 (en) 1999-11-03 2004-08-10 Motorola, Inc Method for validating an application for use in a mobile communication device
US7331058B1 (en) * 1999-12-16 2008-02-12 International Business Machines Corporation Distributed data structures for authorization and access control for computing resources
JP3546787B2 (en) 1999-12-16 2004-07-28 インターナショナル・ビジネス・マシーンズ・コーポレーション Access control system, access control method, and storage medium
US7089583B2 (en) * 2000-01-14 2006-08-08 Saba Software, Inc. Method and apparatus for a business applications server
US6978385B1 (en) 2000-03-01 2005-12-20 International Business Machines Corporation Data processing system and method for remote recovery of a primary password
US7013485B2 (en) * 2000-03-06 2006-03-14 I2 Technologies U.S., Inc. Computer security system
US7246374B1 (en) * 2000-03-13 2007-07-17 Microsoft Corporation Enhancing computer system security via multiple user desktops
US20030061323A1 (en) * 2000-06-13 2003-03-27 East Kenneth H. Hierarchical system and method for centralized management of thin clients
US7185192B1 (en) * 2000-07-07 2007-02-27 Emc Corporation Methods and apparatus for controlling access to a resource
US7194764B2 (en) * 2000-07-10 2007-03-20 Oracle International Corporation User authentication
US7350204B2 (en) * 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
EP1305722A1 (en) 2000-07-28 2003-05-02 American Calcar Inc. Technique for effective organization and communication of information
EP1320953A4 (en) * 2000-08-04 2006-10-25 First Data Corp Method and apparatus for access authentication entity
CA2315933C (en) * 2000-08-14 2004-11-30 Ibm Canada Limited-Ibm Canada Limitee Method and system for granting access to information for electronic commerce
US20020031230A1 (en) * 2000-08-15 2002-03-14 Sweet William B. Method and apparatus for a web-based application service model for security management
US7200869B1 (en) * 2000-09-15 2007-04-03 Microsoft Corporation System and method for protecting domain data against unauthorized modification
US6772157B2 (en) * 2000-10-19 2004-08-03 General Electric Company Delegated administration of information in a database directory
US6886038B1 (en) * 2000-10-24 2005-04-26 Microsoft Corporation System and method for restricting data transfers and managing software components of distributed computers
ATE370458T1 (en) * 2000-11-09 2007-09-15 Ibm METHOD AND SYSTEM FOR WEB-BASED CROSS-DOMAIN AUTHORIZATION WITH A SINGLE REGISTRATION
JP2003044297A (en) * 2000-11-20 2003-02-14 Humming Heads Inc Information processing method and device controlling computer resource, information processing system, control method therefor, storage medium and program
GB2376763B (en) * 2001-06-19 2004-12-15 Hewlett Packard Co Demonstrating integrity of a compartment of a compartmented operating system
US20020078380A1 (en) * 2000-12-20 2002-06-20 Jyh-Han Lin Method for permitting debugging and testing of software on a mobile communication device in a secure environment
US7058978B2 (en) * 2000-12-27 2006-06-06 Microsoft Corporation Security component for a computing device
US7085833B2 (en) * 2001-01-17 2006-08-01 Microsoft Corporation Caching user network access information within a network
WO2002057917A2 (en) * 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
US6947989B2 (en) * 2001-01-29 2005-09-20 International Business Machines Corporation System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US7114021B2 (en) * 2001-03-01 2006-09-26 Symbol Technologies, Inc. System and method providing configuration services for communications devices
CN1504057A (en) * 2001-03-16 2004-06-09 高通股份有限公司 Method and equipment for providing secuve processing and data storage for wireless communication device
US20020162021A1 (en) * 2001-04-30 2002-10-31 Audebert Yves Louis Gabriel Method and system for establishing a remote connection to a personal security device
EP1384212B2 (en) * 2001-04-30 2012-03-07 Activcard Ireland Limited Method and system for remote activation and management of personal security devices
US7107610B2 (en) * 2001-05-11 2006-09-12 Intel Corporation Resource authorization
GB2376765B (en) * 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments with verifiable environment identities
US20030005317A1 (en) * 2001-06-28 2003-01-02 Audebert Yves Louis Gabriel Method and system for generating and verifying a key protection certificate
US7047560B2 (en) * 2001-06-28 2006-05-16 Microsoft Corporation Credential authentication for mobile users
US20030014466A1 (en) * 2001-06-29 2003-01-16 Joubert Berger System and method for management of compartments in a trusted operating system
US7546629B2 (en) * 2002-03-06 2009-06-09 Check Point Software Technologies, Inc. System and methodology for security policy arbitration
US20030014509A1 (en) * 2001-07-16 2003-01-16 Jurado Anthony J. Account management module user interface
JP2003046500A (en) * 2001-08-03 2003-02-14 Nec Corp Personal information management system, personal information management method, and information processing server
US7257815B2 (en) * 2001-09-05 2007-08-14 Microsoft Corporation Methods and system of managing concurrent access to multiple resources
US7389536B2 (en) 2001-11-14 2008-06-17 Lenovo Singapore Pte Ltd. System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer
US7185359B2 (en) * 2001-12-21 2007-02-27 Microsoft Corporation Authentication and authorization across autonomous network systems
US20030135611A1 (en) * 2002-01-14 2003-07-17 Dean Kemp Self-monitoring service system with improved user administration and user access control
US20030163685A1 (en) * 2002-02-28 2003-08-28 Nokia Corporation Method and system to allow performance of permitted activity with respect to a device
US20030167399A1 (en) * 2002-03-01 2003-09-04 Yves Audebert Method and system for performing post issuance configuration and data changes to a personal security device using a communications pipe
US7167983B1 (en) * 2002-03-08 2007-01-23 Lucent Technologies Inc. System and method for security project management
US7490334B2 (en) * 2002-04-25 2009-02-10 Sun Microsystems, Inc. Resource adapter with modular system management interface
US20040001101A1 (en) 2002-06-27 2004-01-01 Koninklijke Philips Electronics N.V. Active window switcher
US9886309B2 (en) * 2002-06-28 2018-02-06 Microsoft Technology Licensing, Llc Identity-based distributed computing for device resources
CN1689302B (en) 2002-08-19 2011-01-19 捷讯研究有限公司 System and method for secure control of resources of wireless mobile communication devices
EP1558983A4 (en) 2002-10-25 2010-07-14 Cambridge Interactive Dev Corp Password encryption key
US7568218B2 (en) * 2002-10-31 2009-07-28 Microsoft Corporation Selective cross-realm authentication
US20040123152A1 (en) * 2002-12-18 2004-06-24 Eric Le Saint Uniform framework for security tokens
US7533157B2 (en) * 2002-12-24 2009-05-12 International Business Machines Corporation Method for delegation of administrative operations in user enrollment tasks
US8554930B2 (en) * 2002-12-31 2013-10-08 International Business Machines Corporation Method and system for proof-of-possession operations associated with authentication assertions in a heterogeneous federated environment
US20040128559A1 (en) * 2002-12-31 2004-07-01 Zurko Mary Ellen Trusting security attribute authorities that are both cooperative and competitive
US7392536B2 (en) * 2003-06-18 2008-06-24 Microsoft Corporation System and method for unified sign-on
US7275259B2 (en) * 2003-06-18 2007-09-25 Microsoft Corporation System and method for unified sign-on
GB2403107B (en) * 2003-06-19 2006-06-14 Hewlett Packard Development Co Policy enforcement
US7047492B2 (en) * 2003-06-30 2006-05-16 Kabushiki Kaisha Toshiba Document management system
GB0325252D0 (en) 2003-10-29 2003-12-03 Becrypt Ltd Password recovery system and method
KR100617841B1 (en) 2004-01-12 2006-08-28 삼성전자주식회사 Mobile communication terminal and method for automatic locking thereof
US7400878B2 (en) 2004-02-26 2008-07-15 Research In Motion Limited Computing device with environment aware features
US7827294B2 (en) 2004-05-06 2010-11-02 American Express Travel Related Services Company, Inc. System and method for dynamic security provisioning of computing resources
US8689276B2 (en) 2004-08-25 2014-04-01 Adobe Systems Incorporated System and method for controlling access to files
US20060059556A1 (en) 2004-09-10 2006-03-16 Royer Barry L System for managing inactivity in concurrently operating executable applications
US20060129948A1 (en) 2004-12-14 2006-06-15 Hamzy Mark J Method, system and program product for a window level security screen-saver
US7941544B2 (en) 2005-03-18 2011-05-10 Sap Ag Session manager for web-based applications
US20060230041A1 (en) 2005-03-29 2006-10-12 Sherwood Everett M System and method for database access control
US20070073694A1 (en) 2005-09-26 2007-03-29 Jerome Picault Method and apparatus of determining access rights to content items
US8074078B2 (en) 2006-05-15 2011-12-06 Research In Motion Limited System and method for remote reset of password and encryption key
US20070277127A1 (en) 2006-05-24 2007-11-29 Carlson Michael P Screensaver for individual application programs
US20080034402A1 (en) 2006-08-07 2008-02-07 International Business Machines Corporation Methods, systems, and computer program products for implementing policy-based security control functions
US7856654B2 (en) 2006-08-11 2010-12-21 Novell, Inc. System and method for network permissions evaluation
EP2068540A4 (en) 2006-09-28 2013-07-24 Nec Corp Mobile terminal device, key operation lock method in the mobile terminal device, and program
US7926086B1 (en) 2006-10-31 2011-04-12 Oracle America, Inc. Access control mechanism for shareable interface communication access control
US8522019B2 (en) 2007-02-23 2013-08-27 Qualcomm Incorporated Method and apparatus to create trust domains based on proximity
US7924810B2 (en) 2007-06-21 2011-04-12 Hewlett-Packard Development Company, L.P. Method and computing system for controlling access
US20100182230A1 (en) 2007-06-26 2010-07-22 Eiko Yamada Terminal, function starting-up method and program for terminal
US8510805B2 (en) 2008-04-23 2013-08-13 Samsung Electronics Co., Ltd. Safe and efficient access control mechanisms for computing environments
US9197417B2 (en) 2009-04-24 2015-11-24 Microsoft Technology Licensing, Llc Hosted application sandbox model
US9183534B2 (en) 2009-06-12 2015-11-10 Apple Inc. Devices with profile-based operating mode controls
US8499304B2 (en) 2009-12-15 2013-07-30 At&T Mobility Ii Llc Multiple mode mobile device
US20110185428A1 (en) 2010-01-27 2011-07-28 Mcafee, Inc. Method and system for protection against unknown malicious activities observed by applications downloaded from pre-classified domains
US8811977B2 (en) 2010-05-06 2014-08-19 At&T Mobility Ii Llc Device-driven intelligence and feedback for performance optimization and planning of a service network
US8468550B2 (en) 2010-06-18 2013-06-18 At&T Intellectual Property I, L.P. Mobile devices having plurality of virtual interfaces
US8539561B2 (en) 2010-08-24 2013-09-17 International Business Machines Corporation Systems and methods to control device endpoint behavior using personae and policies
US9147085B2 (en) 2010-09-24 2015-09-29 Blackberry Limited Method for establishing a plurality of modes of operation on a mobile device
US8838962B2 (en) 2010-09-24 2014-09-16 Bryant Christopher Lee Securing locally stored Web-based database data
EP2453631B1 (en) 2010-11-15 2016-06-22 BlackBerry Limited Data source based application sandboxing

Also Published As

Publication number Publication date
EP1535444A1 (en) 2005-06-01
CA2496165C (en) 2014-07-15
US20150074752A1 (en) 2015-03-12
US20190273742A1 (en) 2019-09-05
US9998466B2 (en) 2018-06-12
HK1079361A1 (en) 2006-03-31
CA2838180C (en) 2014-12-02
AU2003257336A1 (en) 2004-03-03
CN1689302B (en) 2011-01-19
AU2003257336A8 (en) 2004-03-03
US8893266B2 (en) 2014-11-18
US20050213763A1 (en) 2005-09-29
EP1535444B1 (en) 2013-04-17
US10298584B2 (en) 2019-05-21
US20160337363A1 (en) 2016-11-17
ES2420758T3 (en) 2013-08-26
US20120144196A1 (en) 2012-06-07
US8544084B2 (en) 2013-09-24
US9391992B2 (en) 2016-07-12
US8661531B2 (en) 2014-02-25
WO2004017592A8 (en) 2004-04-22
CA2496165A1 (en) 2004-02-26
CA2838180A1 (en) 2004-02-26
US20140171023A1 (en) 2014-06-19
US10015168B2 (en) 2018-07-03
US10999282B2 (en) 2021-05-04
WO2004017592A1 (en) 2004-02-26
CA2838205C (en) 2014-10-28
CN1689302A (en) 2005-10-26
CA2838205A1 (en) 2004-02-26
US20160323285A1 (en) 2016-11-03

Similar Documents

Publication Publication Date Title
US10999282B2 (en) System and method for secure control of resources of wireless mobile communication devices
US8995961B2 (en) System and method of connection control for wireless mobile communication devices
AU2003292922B2 (en) System and method of owner control of electronic devices
US8429410B2 (en) System and method of installing software applications on electronic devices

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: RESEARCH IN MOTION LIMITED, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OWEN, RUSSELL N.;LITTLE, HERBERT A.;YACH, DAVID P.;AND OTHERS;SIGNING DATES FROM 20030930 TO 20031006;REEL/FRAME:047036/0636

Owner name: BLACKBERRY LIMITED, CANADA

Free format text: CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:047178/0691

Effective date: 20130709

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4